Beruflich Dokumente
Kultur Dokumente
=
s =
0
1 , ) (
k
k k
z z D z D . Arrivals occur only at the epochs of the
process 0 , > t v
t
jumps. The intensities of the process 0 , > t v
t
transitions, which are
accompanied by the k-size batch arrival, are defined by the matrices 0 , > k D
t
.The matrix
generating function of these matrices is
=
s =
0
1 , ) (
k
k k
z z D z D .The matrix D(1) is the
infinitesimal generator of the process 0 , > t v
t
. The stationary distribution vector u of this
process satisfies the equations 1 , 0 ) 1 ( = = e D u u ; where e is a column vector consisting of
1's. The average intensity (fundamental rate) of the BMAP is calculated by
e
z
z D
1
,
| ) (
=
=u
.We assume that < . The average intensity
b
of group arrivals is
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 2
defined as . ) (
0
e D
b
=u The variation coefficient
var
c of intervals between successive
group arrivals is defined by 1 ) ( 2
1
0
2
var
=
e D c
b
u The correlation coefficient
var
c of
the successive intervals between group arrivals is given by
. / ))) 1 ( ) 1 ( ( ) ( (
2
var
1
0 0
1
0
c e D D D D c
b cor
=
u The successive service times of
customers at the first stage are independent random variables with general distribution
) (t B with finite first moment
}
=
0
1
) (t tdB b .
After receiving service at the first stage a customer proceeds to the second stage
which is represented by N independent identical servers. The service of an arbitrary
customer at the second stage requires a random number q of servers. Here q is an
integer-valued random variable with the distribution
=
= = > = =
N
m
m m m
q N m q m P q
0
______
. 1 , , 0 , 0 }, {q
No queue is allowed between the first and the second stage. In case a customer completes
the service at the first stage and does not see required number of free servers at the second
stage, it leaves the system forever with the probability . 1 0 , s s . With the probability
1 the customer waits until the required number of servers of the second stage becomes
free and then occupies these servers immediately. The waiting period is accompanied by
blocking the first stage server operating. A structure of the considered tandem system is
illustrated by fig.1.
Figure 1. Structure of the queue under consideration
The stationary distribution of the embedded Markov chain
Let
n
t be the n-th service completion at stage 1. Consider the process
1 }, , , { > = n v r i
n n n n
where
n
i is the number of customers at the first stage at the epoch
n n n
r i t ; 0 , 0 > + is the number of busy servers at the second stage at the epoch
n n n
v N r t ; , 0 , 0 = is the state of the arrival directing process
t
v at the epoch . , 0 , W v t
n n
=
It is easy to see that the process 1 }, , , { > = n v r i
n n n n
is a Markov chain. Enumerate the
states of the chain 1 , > n
n
in the lexicographic order and form the matrices 0 ,
, ,
> m l P
m l
of transition probabilities of the chain from the state having the value l of the first
component to the state having the value m of this component.
Lemma 1. The one-step transition probability matrices
, ,m l
P are defined as:
, 0 , , 0 , 0 ,
, 1 , 0
, 0 1 1 ,
,
> = > > =
< =
+
i V P l i Y P
l m P
i i i l l
m l
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 3
where the matrices 0 , , > i V Y
i i
has the block structure
N o r r
r r
i i
N o r r
r r
i i
Y Y V V
, ' ,
) , (
, ' ,
) , (
) ( , ) (
' '
= =
= =
the blocks
) , ( ) , (
, '
r r
i
r r
i
Y V correspond to transition of the process 1 , > n r
n
from the state r to
the
state
' '
r and are calculated as follows:
} }
}
}
}
}
=
=
=
+ =
+
=
=
+ =
+
=
+
=
+
=
> > > + +
+ + A +
+ + A +
+ + A =
s < s = =
i
k
r N
m N N
r l
i
k
k
N
r l
l N m N r
t D
r N
r N m
m
r l
i
k
k
r
r l
l r
r N
r N m
m
r l
i
k
k
m r
r l
l m r
r N
r r m
m
r r
i
r r
i
r r
i
r r N t dB t t k i P t dF t k P
t dB t t k i P D dt t t dF e q
t dB t t k i P D q
t dB t t k i P D q V
N r r Y V
1
,
0 0
,
0
,
1
,
0
,
1
0
,
1
1
,
1
0
,
1
1
'
,
} , 0 max{
) , (
' ) , ( ) , (
0 )}, ( ) ( ' ) , 1 ( ) ( ) , (
) ( ) ( ' ) , 1 ( ) ( ) ( { ) 1 (
) ( ) ( ' ) , 1 (
) ( ) ( ' ) , 1 (
, 0 , 0
0
'
' '
' ' ' '
o
o
o
o
}
}
+ =
=
> > >
+
+
+ =
0
0
,
,
'
1
0
,
'
1
0
,
'
} , 0 max{
) , (
0 '
), ( ) ( ' ) , 1 ( ) ( ) , (
) 1 ( ) ( ) ( ' ) , ( {
) ( ) ( ' ) , ( '
r r N
t dB t t k i P t dF t k P
t dB t t i P q
t dB t t i P q Y
r N
m N r
i
k
r r
N
r N m
m
r m r
r N
r r m
m
r r
i
o
o
o
where
. , 0 , , , ) ( , ) 1 ( " ) ( '
, ,
0
, , ,
,
0
,
,
N r r r r dt t e e C t
r r
t D
r r
r r t t r r
r
r r
= > = A =
}
o o
) (
,
,
t F
r r
is a distribution function defined by its Laplace-Stieltjes transform
. , 0 , , , ) (
, ,
1
*
,
,
,
N r r r r
s l
l
s F
r
r l
r r
= >
+
=
[
+ =
Corollary 1. The process , 1 , > n
n
is a quasi-Toeplitz Markov chain.
Theorem 1. The necessary and sufficient condition for existence of the Markov chain
, 1 , > n
n
stationary distribution is the fulfillment of the inequality
1 ) ) ( ) 1 ( (
1
1
1 1
1
< +
+ =
+ = =
r
m N l
N
r N m
m
N
r
r
l q y b where ) ,......, (
0 N
y y is a part of the vector
) ,......, (
0 N
y y y = which is the unique solution of the system 1 , ) 1 (
~~
= = ye y Y y
. , 0 ,
0
1
, ,
} , 0 max{
,
~~
, , ,
,
,
) )) ( ] )) ( ) 1 ( ) ( ( ) ( [ ( ) 1 (
N r r
N
r N m
r N r r
m
r r m
r m r
m
t dB t t q t q Y
=
+ = =
+ }
+ + = o o o
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 4
3. Numerical examples
Present the result of one experiment. In experiment we investigate additionally the impact
of the correlation in the input process on the performance characteristics at an arbitrary
time.
Experiment. In this experiment, we investigate the impact of the correlation in the
input process on the mean queue length at the first stage and the mean number of busy
servers at the second stage at an arbitrary time and at service completion epochs at the first
stage.
We consider four different BMAPs with the same fundamental rate 5 = and geometrical
(with parameter h = 0,8) of a number of customer in a batch. The matrices
k
D are defined
as 5 , 1 ), 1 /( ) 1 (
5 1
= =
k h h Dh D
k
k
and then normalized to get the fundamental rate
5 = .
The BMAPs have different correlation coefficients. The BMAP4 is the group Poisson
process. It has the correlation coefficient 0 =
corr
c and the variation coefficient 1
var
= c .
The BMAP5 is characterized by the matrices
|
|
|
.
|
\
|
=
635426 . 1 414363 . 0 682252 . 0
422942 . 0 446573 . 2 692663 . 0
617293 . 0 588578 . 0 334625 . 13
0
D
|
|
|
.
|
\
|
=
211089 . 0 04255 . 0 285172 . 0
080850 . 0 865869 . 0 384249 . 0
218669 . 0 363141 . 0 546944 . 11
D
This BMAP has the correlation coefficient 1 . 0 =
corr
c .
The BMAP6 has the correlation coefficient 2 . 0 =
corr
c and is defined by the matrices.
|
|
|
.
|
\
|
=
959665 . 1 565264 . 0 597058 . 0
467885 . 0 289674 . 2 517817 . 0
592394 . 0 606178 . 0 732675 . 15
0
D
|
|
|
.
|
\
|
=
8046855 . 0 2554810 . 0 0090460 . 0
1860820 . 0 6668640 . 1 0340970 . 0
0763240 . 0 4668680 . 0 2421200 . 24
D
The BMAP7 has the correlation coefficient 3 . 0 =
corr
c and is defined by the matrices
|
|
|
.
|
\
|
=
7526180 . 1 3874445 . 0 2959610 . 0
2000070 . 0 2322000 . 2 1451500 . 0
3611990 . 0 3933290 . 0 5398400 . 25
0
D
|
|
|
.
|
\
|
=
8046855 . 0 2554810 . 0 0090460 . 0
1860820 . 0 6668640 . 1 0340970 . 0
0763240 . 0 4668680 . 0 2421200 . 24
D
BMAP5-BMAP7 has the variation coefficients 2
var
= c .
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 5
The service time at the first stage is the same as the service time defined above. The
number of servers at the second stage N = 5. The probability of blocking after first stage
. 5 . 0 =
The parameters of service at the second stage are as follows:
5 and 1 . 0 , 1 . 0 ,
1 . 0 , 3 . 0 , 3 . 0 , 1 . 0
5 4
3 2 1 0
= = =
= = = =
q q
q q q q
.
Figure 2. The mean queue length at the first stage at the service completion epochs and at
an arbitrary time as functions of fundamental rate for different BMAPs.
Now investigate the impact of the service rate at the second stage on the number of
busy servers at the second stage and the mean queue length at the first stage at the service
completion epochs and at an arbitrary time
. value on the , and , of dependence e present th 4 - 3 Figure
~~ `~
L L N N busy
busy
Figure 3. The mean number of busy servers at the second stage at the service completion
epochs and at an arbitrary time as functions of the service rate at the second stage.
Figure 4. The mean queue length at the first stage at the service completion epochs and at
the arbitrary epochs as functions of the service rate at the second stage
Basing on the result of experiment, we can conclude that the correlation coefficient is an
important descriptor of the input flow and it cannot be ignored.
Conclusion
In this paper, the BMAP/G/1 - /M/N/0 tandem queue with losses and blocking is
studied. The processes of the system states at embedded epochs and at arbitrary time are
investigated. The condition for stationary distribution existence of these processes is
derived and the algorithm for calculating the steady state probabilities is presented.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 6
Expressions for the loss probability and some other performance characteristics of the
system are derived. The numerical examples are presented. They confirm importance
of the special treatment of the tandem queuing models with the BMAP. The results can be
exploited for capacity planning and performance evaluations of real-life tandem queues
and two-node networks in case of correlated bursty input and the discipline of admission
to the second stage providing losses of customers and blocking of the first stage server.
References
Harold Abelson, Gerald Jay Sussman, and Julie Sussman. Structure and Interpretation
of Computer Programs. MIT Press, Cambridge, Massachusetts, 1985.
Ronald J. Brachman and James G. Schmolze. An overview of the KL-ONE knowledge
representation system. Cognitive Science, 9(2):171--216, April--June 1985.
Georg Gottlob. Complexity results for nonmonotonic logics. Journal of Logic and
Computation, 2 (3):397-425, June 1992.
John Haugeland, editor. Mind Design. Bradford Books, Montgomery, Vermont, 1981.
Douglas B. Lenat. The nature of heuristics. Technical Report CIS-12 (SSL-81-1),
Xerox Palo Alto Research Centers, April 1981.
Hector J. Levesque. Foundations of a functional approach to knowledge representation.
Artificial Intelligence, 23(2):155--212, July 1984.
Hector J. Levesque. A logic of implicit and explicit belief. In Proceedings of the
Fourth National Conference on Artificial Intelligence, pages 198--202, Austin,
Texas, August 1984. American Association for Artificial Intelligence.
Ferng, H.W., Chang, J.F., Connection-wise end-to-end performance analysis of queueing
networks with MMPP inputs, Performance Evaluation, 2001. V.43, p.39-62.
Graham, A., Kronecker Products and Matrix Calculus with Applications, Cichester: Ellis
Horwood,1981
Balsamo, S., Persone, V.D.N., Inverardi, P., A review on queueing network models with
finite capacity queues for software architectures performance prediction,
Performance Evaluation, 2003. V.51, p.269-288.
Lucantoni, D., New results on the single server queue with a batch Markovian arrival
process, Communication in Statistics-Stochastic Models, 1991, V.7, p.1-46.
Sohnlein, S., Heindl, A., Analytic computation of end-to-end delay in queuing networks
with batch Markovian arrival processes and phase-type service times, Proc. of 13-
th Int. Conf. on Analytical and Stochastic Modelling Techniques and Applications
(ASMTA 2006), Bonn, 28-31 May 2006 / Eds. K. Al-Begain, Bonn. 2006, V. 65,
p. 97-102.
Gomez-Corral, A., On a tandem G-network with blocking, Advances in Applied
Probability, 2002, V.34, p.626-661.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 7
THE EFFECTIVENESS OF USING INTERNET AS A PRINCIPAL
INFORMATION RESOURCE IN TEACHING AND LEARNING ACTIVITY IN
HIGHER EDUCATIONAL INSTITUTIONS IN MALAYSIA.
Farahiza Zaihan Azizan
Jabatan Teknologi Maklumat,Kulliyyah Muamalat
Kolej Universiti INSANIAH
Jalan Sultanah Sambungan, 05350 Alor Star, Kedah
Tel: 0194254740/047374372 Fax: 047374371
farahiza_zaihan@yahoo.com
Abstract
Globalization has brings the major changes to the growth of technology. The use of
Information and communication technology (ICT) has leaved a tremendous impact to
human life. The rapid growth of this technology brings a new dimension to the education
field. This exploratory study examined the effectiveness of using internet as a principal
information resource in teaching and learning activity in higher educational institutions in
Malaysia. The library researches done by the researcher have shown that majority of the
previous researchers indicated that there are significant relation between the internet and
the student and also the lecturer in using internet as a principal information resource in
teaching and learning activities. The high used of internet for the quest for information
also supported by their favorable towards ICT. The findings showed that internet is a
technology that considered brought benefits to the student and lecturer in teaching and
learning activities as well as the applications provided by the internet.
Keyword: Information and communication technology (ICT), internet, teaching and
learning, principal information resources.
1.0 Introduction
The information revolution has leaved a great impact to the growth of science and
technology in the world. Nowadays, the citizens are known as a knowledge citizen. The
technologies are invented for the better lives. The human lives became comfortable and
pleasant. One of the most crucial inventions in science and technology is a computer.
Computer is a machine that totally change the way people work, learn and solve the
problem. The technology came by from the use of computer is the information and
communication technology (ICT). The ICT has changed the structure of human live.
People can easily communicate with each other without any barriers. They can use the ICT
for 24 hours, 7 days a week and 365 days a year. The education fields also use the ICT in
teaching and learning activities. It transformed the conventional techniques to the modern
techniques by using the ICT applications such as internet into the teaching and learning
processes. The ministry of education of Malaysia has made a good use of ICT in schools
and higher educational institutions in Malaysia. They are driven the institutions towards
science and technology in education process. The use of ICT in education is expected to
improve teaching and learning process, increase focuses in class and as well as in
assessment. In addition, ICT is expected to add value on student skills and knowledge.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 8
Internet is one of the ICT applications that is widely use all over the world. Internet is such
a huge world full of interesting things. People can use internet to find or learn about
information, to listen to music, to watch movie and to communicate with friends. Internet
is a very popular application with maximum access at a low cost. Furthermore, nowadays,
internet has been used as a platform to the portal and web that can be used by the student
and the lecturer to search for the information and to make a discovery. People at every
level of age tend to use an internet for information. They can get access to the information
within a second. All these factors mention above make an internet an interesting
technology to discover as well as to apply in lives. Therefore, the student and also the
lecturer especially in higher educational institutions choose to use an internet as an
information resource in their teaching and learning activities. Internet provides them with
information valley that they can find and learn about information from the virtual library,
subscribes the article and journal from the electronic journal (e-journal), communicates
with friend and other people from different a city and town using the forum application or
download and upload the tutorial from and into the portal or web. Thus, this study is
primarily aimed to examine the effectiveness of using the internet as a principal
information resource among the students and lecturers in the higher educational
institutions and also to discover the benefits of using internet in teaching and learning
activities. Specifically, this study focuses in four main objectives which are listed below:
To examine is there a relation between student and lecturer with the internet as a
principal information resources.
To examine the role of internet in teaching and learning processes.
To survey the influence of the internet in education
To identify the benefits from the internet as a principal information resources.
2.0 Background
The growth of science and technology provided the student and lecturer in higher
educational institutions with various convenient facilities in order to support their teaching
and learning processes. The convenience facility is provided for their comfortable and to
make their teaching and learning processes more interesting and focuses. The use of ICT
application such as internet helped them to teach and learn fast at a low cost. The search
for information becomes easier and faster at anytime, and anyplace. The needs for
information from the articles, journals, newspapers and magazines, drive them to find for
the appropriate technique that can help them to complete the process of teaching and
learning. Internet and the applications offered such as portal, web, homepage, virtual
library and many more attracted the students and the lecturers to choose the internet as a
principal information resource in their teaching and learning activities. Thus, there are
important to examine the relation between the student and lecturer with the internet. In
add, we can identify the benefits of the internet offered to the user.
3.0 Literature Review
Internet has changed the way people work and live. It change the way we communicate
and interact with other people. The usage of internet has increased from day to day. The
internet is widely used in business, education, engineering, architecture and many more
fields. For example, Baloh and Trkman (2003) stated that the integration between the
information and the people in the organization drive the organization towards objective.
The use of internet in Malaysia begun in 1990 and JARING was the first internet service
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 9
provider (ISP) launched by MIMOS (Malaysian Institute of Microelectronic System). The
Malaysia government, acting with United States of America, together for a common
purpose to increase the usage of the internet by using the satellite. In add, the government
also launched the MSC (Multimedia Super Corridor) project in 1996 to show their support
to the ICT technology. The growth of internet usage in Malaysia is driven from the factors
such as low cost, wide access, faster to communicate, and powerful application as well as
the convenience infrastructures provided by the government.
Internet is synonymous in management. According to statistic from Baloh and Trkman
(2003), there were almost 300 millions of internet users, 2 billions of websites and 17
millions of domains registered only in United States of America. The number shown that
internet has a significant influence over the individual or the organization on how, why
and when they work. The use of internet has leaved a deep impact to how people do their
work, the process of work and as well the throughout. The use of internet in education was
first introduced by the implementation of the e-learning concepts. Malaysia also applied
the e-learning in teaching and learning activities. Glenda, Mahon, Devonish, Alleyne and
G.Alleyne (2006) in their study, the perception of information and communication
technology among undergraduate management students in Barbados found that there are
empirical studies done by the previous researchers all over the world shown that there is a
significant relation between the computer, internet and the student as well as the lecturer.
The empirical studies are shows in the following table:
Table 1: The Empirical Studies by The Previous Researchers
Researcher Year Study / Research Study / Research Outcome
Dorup 2004 Study Among Medical
Students In Denmark
The students used the computer to
access to the internet and send email
at home frequently and they
supported the use of ICT in learning
activity to replace the conventional
method.
Schumacher and
Morahan-Martin
2001 Study On Gender
Differentiates In
Experience And
Perspective Towards
Computer.
Male user had more experience in
using computer compared to female.
The male attitude towards computer
is positive compared to negative
attitudes from the female.
Kay 1992 Study On Gender
Towards The Computer
Usage.
Female user seems less interest in
using computer and internet.
Shashaani 1997
Kraut et al 1998 Study On The Level Of
Age In Computer
Usage.
The adults spent more their time to
access the internet compared to teen
age.
Ramayah and
Jantan
2003 The relationship between age and
internet usage is negative. The use of
internet is not influenced by the age
factor. The student used internet
frequently.
Cuban 2001 Study On Computer
And Internet Usage
Among The US
University Students.
The USA university student used
computer to generate document,
access to the internet and
communicate with friend using email.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 10
The lecturer used computer to do
their research and also in their
teaching activity.
Frizzler 1995 Study On Relationship
Between Computer And
Course Administrator
Computer has the ability to improve
the teaching and learning method at a
lower cost.
There were empirical studies done by the Malaysian researchers to perceive the relation
between the internet and the education. The table below shows several empirical studies
done in Malaysia.
Table 2: The Empirical Studies by the Malaysian Researchers
Researcher Year Study / Research Study / Research Outcome
Goh Ying
Soon,
Azman Che
Mat, Tey
Meng Kar
2005 The Use Of Technology
In Teaching Language:
The Challenge, Treat And
Opportunity.
The study found that technology has a
great impact to the education. Besides,
the researcher has identified e-learning
as an effective method can be used in
the teaching and learning activity.
Shukriah
Ismail
2003 The Use Of Internet
Among The
Undergraduate Student Of
UTM
The study has identified the significant
relation between the undergraduate and
the internet as an information resource
in teaching and learning process. The
internet provided virtual library to
undergraduate students.
Nasariah
Mansor,
Nafisah
Mahmud,
Faizah
Ahmad
No
date
IT Application In Writing
Article: A Survey Of Skill
And Perception Of The
Student.
The study found that majority university
students used computer in writing
articles to generate a professional
document. The internet also used as an
engine to search for information and to
collect data from the internet.
Norazen Md
Dali,
Hassan
Ashari
Zainal
Abidin,
Mohd
Ruzman
Mat Ali
No
date
A Competency Of Using
ICT In Teaching And
Learning Among The
Lecturer.
The study found that majority of the
lecturers used ICT in their teaching and
learning activity. They have positive
attitudes towards the computer and ICT.
Robiah
Sidin, Juriah
Long,
Khalid
Abdullah,
Puteh
Mohamed
2001 The Adoption Of Science
And Technology: The
Impact Of Technology To
The Training And
Education Among The
Malaysian Youth.
The study found that the youth accepted
and have adapted the science and
technology and also have positive
attitudes towards the technology.
Surendran
a/l sankaran
2006 The Use Of Internet As
An Information Resource
Among The UUM
Lecturers.
The study found that the lecturer
awareness about the importance of using
internet in teaching is high. The lecturer
moderately used an internet as a search
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 11
engine to find for the information. There
is also a significant relation between the
skill of using internet and the purpose of
using the internet.
Wahyu
Idrus,
Yahya
Buntat
No
date
The E-Learning
Application In Teaching
And Learning Activity In
Malaysia Primary School:
Issues And
Implementation.
The study identified e-learning is a
suitable technique to be used in
presenting the teaching and learning
module in the higher educational
institutions in Malaysia.
Alias Daud,
Zainab
A.N., Zaitun
A.B.
No
date
The Impact Of IT On
Higher Education For
Malaysia
The study found that there are the needs
to transform the conventional method of
teaching and learning to the ICT driven.
Wong Su
Luan, Ng
Siew Fung,
Hanafi Atan
2008 Gender Differences In
The Usage And Attitudes
Toward The Internet
Among Student Teachers
In A Public Malaysian
University
The study found there are significant
relation in gender differences in the
usage and the attitudes toward the
internet among the student.
4.0 Method
This is a descriptive study that used stratified random sampling technique and a library
survey. The sample was chosen from the students and lecturers of higher educational
institutes in Malaysia. Five hundred students and lecturers were targeted for the study,
using self-administered questionnaire. The questionnaire was developed for this study by
the authors of this paper. The first draft of the questionnaire used in the survey was tested
on 40 students and 10 lecturers from Kolej Universiti Insaniah (KUIN). Data from the
pilot study was used to adjust the questionnaire and were not included in the final analysis.
50 questionnaires were mailed to each higher educational institution in northern region of
Malaysia. The data were collected by hand and mail and then they were integrated in
Microsoft Excel before imported into Statistical Package for the Social Sciences (SPSS)
for analyzing.
5.0 Findings And Discussions
The library surveyed by the researcher shown that there is a significant relation between
student and lecturer with the internet. This statement is supported by the study done by
Nasariah, Nafisah and Faizah (not dated) and Surendran (2006). Internet is used in
teaching and learning process as a technology that helps and supports the student and
lecturer in searching for information. The use of internet as a principal information
resource made teaching and learning activities more interesting and fascinating. For
example, the used of multimedia elements, audio, video, image, text, animation and many
more in order to prepare for the lecture notes, make the teaching session full of focuses
and attractions. In addition, the use of internet in teaching and learning process also is
influenced by the student and lecturer computer skills and literacy. The computer literacy
proved to help them to use the internet in effective and efficient manners. According to
Dorup (2004) as cited in Glenda et. al., (2006), he said that most of students have
developed their computer skills from home. They had used the computer at home and they
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 12
also have access to the internet. Their skills increased when they frequently used the
computer and the internet. Thus, the access to the internet helped them to get focuses and
also supported them with multi-kinds of information and sources. Rhiza (2008) stated that
the use of e-learning has transformed the conventional method of teaching and learning
into a new dimension. Furthermore, Frizzler (1995) as cited in Glenda et. al., (2006)
mentioned that computer could help in order to improve the teaching and learning method
in class. Shukriah (2003) in her empirical study found that the contents of internet are
suitable to use as a source in their teaching and learning process. The internet is an ICT
technology that provides great benefits to the student and lecturer in order to improve their
teaching and learning processes.
6.0 Conclusion
This study found that students and lecturers were generally favorable to ICT in an
academic setting. Students had access to computers and the Internet off campus. There
also seems to be widespread usage of various forms of information technology such as
Internet, Web and email. With respect to age, no significant differences found. It is
recommended that university administrators and also the higher educational institutions
maintained the high levels of ICT usage among students through continuous education and
promotion of the benefits attached to ICT resources such as internet. It is also
recommended the university and the institution to encourage lecturers and course
administrators to embrace e-learning and its resources in their teaching and learning
activities. A limitation of the study was the relatively small sample size, which may limit
the generalizability of these findings to the population under study. Future research should
consider undertaking large-scale studies of attitudes to internet and its usage outside the
academic setting, targeting business professionals and other practitioners.
References
APNIC. (2004). Addressing The Challenge Of Responsible Internet Resource Distribution
In The Asia Pacific Region. [Online]. Issue 9, February.
Baloh, P. & Trkman, P. (2003). Influence of Internet and Information Technology on
Work and Human Resource Management. [Online].
Glenda Gay, Sonia Mahon, Dwayne Devonish, Philmore Alleyne, & Peter G. Alleyne.
(2006). Perceptions of Information and Communication Technology Among
Undergraduate Management Students in Barbados. [Online]. International Journal
of Education and Development Using ICT, Vol. 2, No.4.
Nasariah Mansor, Nafisah Mahmud, Faizah Ahmad.(n.d). Aplikasi TM Dalam
Pembelajaran Penulisan Ilmiah: Tinjauan Dari Aspek Kemahiran dan Persepsi
Pelajar. Sintok: Universiti Utara Malaysia.
Norazen Md Dadi, Hassan Ashari Zainal Abidin & Mohd Ruzman Mat Ali. ( ). Tahap
Kompetensi Pensyarah Menggunakan ICT dalam Pengajaran dan Pembelajaran
(P&P). Kolej Mtrikulasi Pahang.
Rhiza S.Sadjad. (2008). Globalisasi, Sistem Pembelajaran dan Internet. Makasar:
Universiti Hasanuddin, Indonesia.
Wong Su Lan, Ng Siew Fung & Hanafi Atan. (2008). Gender Differences in the Usage
and Attitude Towards the Internet Among Student Teachers in Public Malaysian
Universities. American Journal of Applied Sciences, 5 (6): 689-697.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 13
THE USAGE OF WIRELESS SENSOR NETWORK FOR EARLY DETECTION
METHOD OF CORROSION ON BURIED STEEL GAS PIPELINE
Mohd Saiful Abdul Rahman, Mazeyanti Mohd Ariffin
Universiti Teknologi Petronas, Malaysia
pulsepul@gmail.com, mazeyanti@petronas.com.my
Abstract
Early detection on any abnormality on the pipeline such as leakage is essential for efficient
pipeline monitoring. As to date, wireless sensors have been widely used to gather
information in monitoring reliability of the pipelines. The commonly used sensors are
temperature and pressure sensors. One of the issues related to pipeline monitoring is the
reactive rather than proactive maintenance approach to leakage and abnormality. The
objective of this research is to develop a method for early detection of corrosion, in which
the buried pipeline is exposed to changing temperatures and gas flow pressures. This will
ensure that maintenance works can be made in time to prevent pipeline burst, as well as to
minimize operational cost.
Keywords: Early detection; wireless sensors; corrosion; buried pipeline.
1. Introduction
Oil, gas and water are the key natural resources to the life and source of economy for most
countries in the world (Bonny B.N. Umeadi, K.G. Jones, 2008). These natural resources
are transported from its original plants or storage through extended pipelines which
spreads throughout the countries. In some countries, pipelines also used to supply gas
directly to users. These pipelines serve as the backbone between producers and consumers.
Maintaining pipelines is essential to sustain economic growth, political stability and also
safety. Delays in detecting leakage on pipeline may lead to more serious matters such as
fire and fatality (Richard Kluth, Jerry Worsley, 2008).
Wireless technologies have evolved so rapidly nowadays and widely used in many
applications and services. This is mainly because it can remotely place and uses its own
power source such as battery to power itself. There are number of technologies to monitor
and protect pipelines. Most of these are designed specifically for detecting and locating
pipeline leakages. These technologies allow a remote facility to detect and to report the
positions of any leakage as shown in figure 1. Most of these solutions rely on the
availability of a network to transfer the information and report leakages (I. Jawhar, N.
Mohamed, and K. Shuaib, 2008). Pipeline monitoring systems have been using wireless
devices as part of the system communication and information transfer.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 14
Figure 1: Common Oil and Gas Pipeline Monitoring Setup
(E. Odusina, J. Akingbola, and D. Mannel, 2008) stated that one of the industries that have
taken the advantage of wireless sensors is oil and gas industry. Monitoring of pipeline is
very crucial because of its valuable resources as well as for safety precautions leakages.
Wireless sensors have been widely used to monitor the health and the condition of the
pipeline. Continuous monitoring of pipelines is necessary to ensure the safety operation of
pipelines transmission as shown by (Yumei Wen, Ping Li, Jin Yang, Zhangmin Zhou,
2004). However, several issues and problems have been discussed related to the usage of
wireless sensors in pipeline monitoring system. One of the issues is to detect leakage or
abnormality of the pipeline as early as possible particularly in gas pipeline.
It is very important to detect the signs of pipeline defects as early as possible to avoid
serious problems such as endangering the environment, and if the pipeline is near
populated area, it can be a disaster. Structural defects on gas pipeline may caused by
several factors such as corrosion. Several factors have been identified that lead to the event
of buried pipeline corrosion such as pipe coatings, soil conditions, changing of
temperature, stresses, pipe pressure and cyclic loading effects.
The objective of this research is to develop a method for early detection of corrosion, in
which the buried pipeline is exposed to changing temperatures and gas flow pressures so
that prompt actions can be taken to prevent incidents or fatality.
A pipeline monitoring and inspection system has several tasks to be performed for natural
gas pipelines environment to ensure the integrity of the pipeline as shown by (Yuanwei
Jin, Ali Eydgahi, 2008). These include measuring pipe wall thickness, measuring velocity
and flow of gas, detecting gas contamination in pipeline and also determining structural
defects on pipe. Gas pipelines are commonly placed in hazardous environmental such as
deserts, underwater and buried deep (Daniele Inaudi, Riccardo Belli, 2008).
These conditions can cause deterioration or even damage due to corrosion, erosion and
fatigue. Major problem is to detect corrosion cracks as shown in figure 2.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 15
Figure 2: Corrosion Cracks That Result a Leakage
The main focus in this research is on early detection of corrosion on pipeline concentrating
on a) changing of temperature of pipeline and b) pressure of gas flow in the pipeline.
2. Related Works
The problem of corrosion cracks has been long affected gas pipeline and has been widely
discussed in recent years especially for oil and gas industry. Many researchers have been
motivated to look into from different perspectives.
Data and results on the application of long gage-length fiber-optic sensors for monitoring
pipeline corrosion, including internal wall thinning and external stress corrosion crack
(SCC) growth were presented by (R.C. Tennyson, W.D. Morison, T. Cherpillod, 2005).
Furthermore, the authors included complete mathematical model in the experiment to
monitor internal pipeline wall corrosion rate. The model shown in the publication can be
useful to this research due to the relation of pressure and temperature used in that model
although the context of the model is for fiber-optic sensing.
(R.K. Ginzel, W.W. Kanters, 2002) have shown types of defects known in pipeline
industry and the suitable methods for assessment of the defects were presented. Types of
corrosion and cracks also been discussed in the publications. However, there was no
detailed discussion on how to prevent and calculate the defects.
The failure analysis of an 18-inch diameter electric resistance-welded gas pipeline was
discussed. Mechanical and operating parameters of the pipe used were also included in the
publication to show the detailed characteristic of the pipeline. Schematic views and photos
during examination of ruptured pipe were shown to depict the level of failure occurs
during the incident in (F. Hassan, J. Iqbal, F. Ahmed, 2006). However, the analysis was
made after the incident of pipe ruptured.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 16
The internal corrosion direct assessment (ICDA) was been implemented in the 24 inch
diameter of main gas transmission pipeline by (Ahmad Taufik, Nathanel Nainggolan,
2006). The corrosion rate prediction associated with carbon dioxide and water was done
using simulation. The simulation utilized by using NORSOK and de Waard model. The
corrosion rate model in the simulation also included temperature and pressure parameter
that can be relevant to this research.
A theory has been developed for the effect of pressure on the rates of corrosion reactions
in high sub-critical and supercritical temperatures aqueous system by (Digby D.
Macdonald, 2003). The theory is compared with experimental data for corrosion of carbon
steel in the water at 481 C and at pressures ranging from 170 bar (2500psi) to 238 bar
(3500psi). Although, parameters of temperature and pressure were included in the model,
the equation emphasized more on the chemical reaction of the corrosion process.
Norwegian operators and authorities used NORSOK model for prediction of CO2
corrosion. The model is based on the experiments done at the Institute for Energy
Technology in Norway, (Stein Olsen, 2003). All experiments perform at various
temperature, pressures and pH values. Steels of different types have been tested in the
experiments and concluded that the predicted corrosion rates are conservative with respect
to the most steel type. The limitation of this model is that it is based on experimental data
for temperatures above 20 degrees Celsius. All predicted corrosion rates for temperatures
below 20 degrees Celsius are set equal to the predicted corrosion rate at 20 degrees
Celsius. All experiments for lower temperatures show, however, a steady decrease of the
corrosion rate with reduced temperature.
The idea proposed in this research is to take advantage of all the related research
mentioned and use all relevant and important information in order to fulfill the given
objective.
3. Methodology
System modeling and simulation are the two methods that will be used to simulate
solution to the abovementioned problem. Mathematical model based on NORSOK method
[13] for CO2 corrosion rate computation will be the basis for the development of the
system model.
3.1.System Model
Figure 3, shows the schematic view of the corrosion for the experimental setup to calculate
corrosion rate in the presence of temperature and pressure parameters. Assuming that a
steel pipe with diameter d, already in corroded state C. Various value of temperatures and
pressures will be performed in the experiment and each rate of corrosion will be noted. If
values of corrosion rate are constantly changing with different values of temperature and
pressure, then the hypotheses of the effect by temperature and pressure to the pipeline
corrosion rate will be proven.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 17
Figure 3: Schematic view of Corrosion Rate Calculation with the Presence of
Temperature and Pressure parameters
3.2. Mathematical Model
For the effect of temperatures and pressure in determining the corrosion rate, one has to
understand related models that have include temperatures and pressure as parameters. The
most suitable model used is based on NORSOK method [13]. This is a model used to find
corrosion rate for carbon steel containing CO
2
at different temperatures, PHs, fugacity
and pipeline wall shear stress.
4. Discussions
This is only the preliminary stage of the research. Several values of temperatures and
pressures will be tested in the simulation on the corrosion rate. Limitation of the model in
this research is on the section of the tested pipeline, where corrosion is already happened
and the simulation made is to observe the changing of the corrosion rate.
5. Conclusion
In conclusion, the research on the effects of temperature and pressure on the corrosion rate
of buried gas pipeline is still ongoing on the modeling phase. Future works will be on
improving the model so that by observing the corrosion rate values, the pattern for
structural defects caused by corrosion can be predicted.
6. References
Ahmad Taufik & Nathanel Nainggolan (2006). Gas Flow Modelling and Simulation To
Predict Corrosion Attack On Pipeline, In Proceeding of INDOPIPE 2006
Conference & Exhibition, The Ritz-Carlton Hotel, Jakarta, Indonesia, 30 May-1
June 2006
Bonny B.N. Umeadi & K.G. Jones (2008). The Development of An Intelligent Sensor For
The Monitoring of Pipeline System Integrity, nanomindidc.com ,Oil and Gas 2008
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 18
Daniele Inaudi & Riccardo Belli (2008). Detection and Localization of Micro-Leakages
Using Distributed Fiber Optic Sensing, In proceeding of The 7th International
Pipeline Conference, Calgary, Canada,October 2008
Digby D. Macdonald (2003). Effect of pressure on the rate of corrosion of metals in high
sub-critical and supercritical aqueous systems, Journal of Supercritical Fluids,
Volume 30, pp. 375382, September 2003
E. Odusina, J. Akingbola, and D. Mannel (2008). Software-Based Pipeline Leak
Detection. Advanced Chemical Engineering Design CHE 4273Department of
Chemical Engineering and Materials Science University of Oklahoma, May 2,
2008
F. Hassan, J. Iqbal & F. Ahmed (2006). Stress corrosion failure of high-pressure gas
pipeline, Journal of Engineering Failure Analysis, Volume 14, pp. 801-809,
November 2006
I. Jawhar, N. Mohamed, & K. Shuaib (2008). Reliability Challenges and Enhancement
Approaches for Pipeline Sensor and Actor Networks. In proceeding of The
International Conference on Wireless Networks (ICWN 2008), Las Vegas, Nevada,
USA, July 2008
Richard Kluth & Jerry Worsley (2008). Digital Pipeline Leak Detection Using Fiber-optic
Distributed Sensing (DTS). Westwick-Farrow Publishing, Whats New in Process
Technology, April 2008
R.C. Tennyson, W.D. Morison & T. Cherpillod (2005). Monitoring Pipeline Integrity
Using Fiber Optic Sensors, In proceeding of Corrosion 2005 Conference, Warsaw,
Poland, June 2005
R.K. Ginzel & W.W. Kanters (2002). Pipeline Corrosion and Cracking and The
Associated Calibration Considerations for Same Side Sizing Applications , e-
Journal of Nondestructive Testing, e-Journal of Nondestructive Testing, Vol. 7,
No. 7 , July 2002
Stein Olsen (2003). CO2 Corrosion Prediction By use of the NORSOK M-506 Model -
Guideline and Limitations, In Proceeding of NACE Corrosion 2003 Conference,
San Diego, CA, March 2003
Yuanwei Jin & Ali Eydgahi (2008). Monitoring of Distributed Pipeline Systems by
Wireless Sensor Networks. In proceeding of The 2008 IAJC-IJME International
Conference, 2008
Yumei Wen, Ping Li, Jin Yang & Zhangmin Zhou (2004). Adaptive Leak Detection and
Location in Underground Buried Pipelines, International Journal 0f Information
Acquisition, vol.1, no.3, pp269-277, 2004
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 19
THE EFFECTIVENESS OF E-LEARNING ISLAMIC STUDIES FOR FORM
FOUR STUDENTS
Hasmiza Othman, Seyed Ahmad Rahimi & Nazirah Mat Sin
Multimedia University, Cyberjaya
hasmiza@uembuilders.uemnet.com, s.ahmad.rahimi@gmail.com,
nazirah.sin@mmu.edu.my
Abstract
Despite the effort by Ministry of Education to promote ICT in education in Malaysia,
Islamic education syllabus is way far behind the intended plan in terms of its ICT usage in
learning and teaching. It was believed that Islamic Studies faced the risk of being
misleading or misunderstood if the lessons were taught through self-accessing method
with minimal intervention from teachers; a method that e-learning is popular for.
Embracing on Dick and Carey instructional model as the theoretical framework, this paper
explored the form 4 Islamic Studies syllabus The steps and procedures of Hajj and
Umrah and created an e-learning version of it. In this study, the contents from the
Islamic Studies textbook of the National Secondary School in Malaysia were revised and
studied using the Dick and Carey systematic approach beginning from identifying the
instructional goal and moving the way up to formative and summative evaluation
processes. The interview sessions were then conducted to see whether the instruction
could be misleading and misunderstood as what it was perceived before. The goal of the
instructions being developed in this study was to validate (or vindicate) those beliefs and
observe the extent of truth the beliefs hold. Findings from this study are discussed and
reported in the paper.
Keywords: e-learning, multimedia, Malaysian education
Introduction
Despite the effort by Ministry of Education to promote ICT in education in Malaysia,
Islamic education syllabus is way far behind the intended plan in terms of its ICT usage in
learning and teaching. Problems have been identified by Hamzah, Ismail, and Embi (2009)
ranging from the teachers, students and the facilities as well as the syllabus itself.
The concerns raised by the teachers in adapting ICT technology in the classroom are
circling around the issues of how to make use of ICT as part of the pedagogy due to the
nature of the syllabus itself, that is, the Islamic Studies is different from any science
subjects because it is non-experimental and no input-output formula that can be tested
(Hamzah et al, 2009).
It was also reported that the subject needed a creative and attractive teaching approach
that can engage the students interests in the subject. Hamzah et al (2009) acknowledged
that students were more attracted to use the computer because it was more informative
and had lots of pictures; a contradiction to the normal teaching style which was
monotonous and static. However, by just putting any teaching materials in slides and
project them on the classroom wall does not signify e-learning because that does not help
the learner extract the learning (Blass & Davis, 2003).
The initial work in producing a textbook CD-ROMs for English and Mathematics took
place back in 2003 by the Malaysian Ministry of Education. The work progressed in 2004
until 2005, producing CD-ROM textbooks for Bahasa Malaysia and English.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 20
However, there was limited work being carried out for other non-core subjects, including
Islamic Studies subject. Hamzah et al. (2009) reported that the reasons for this were
because the nature of the subject itself and the concept of self-accessing learning in e-
learning which was believed unsuitable for a subject like Islamic Studies.
Islamic Studies is a subject that is non-experimental, no input-output formula and cannot
be tested and analyzed, thus, signifying the difference between this subject and science
subjects. (Hamzah, et al. 2009). This has been the main basis for the underdevelopment of
Islamic Studies into e-learning.
However, Islamic Studies has broad sub-topics that can be thought out and considered to
be e-learning. This research is intended to act as the tool to bridge the gap between the
Islamic Studies subject and e-learning and subsequently serve as a guideline for future
development of e-learning instruction for Islamic Studies.
Research Questions
This research is intended to find answers for these questions:
a. Is it true that e-learning is not suitable for Islamic Studies subject?
b. What is the criterion the Islamic Studies must have in order to be e-learning?
Theoretical Framework
The framework used for this study is based on the Dick and Carey theory and, the
Systematic Instructional Design Model (D&C Model), also from Dick and Carey. The
D&C Model consists of interlinked instructional disciplines that help the instructional
designer to learn, understand, analyze and improve the practice of these disciplines. The
term disciplines defined by Peter Senge (1990) as quoted in Dick and Careys textbook
means - referring to the theories and technique that must be studied and mastered and put
into practice. There are ten interconnected disciplines that represent the theories,
procedures and techniques engaged by the instructional designer to design, develop and
evaluate instructions, and finally revise them (Figure 1).
Figure 1 : Dick and Carey Instructional System Design
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 21
One of the advantages of D&C Model is that the model works well as a blueprint to
instructional design regardless of the form of the intended instruction. The intended
delivery format of the Islamic Studies subject in this study is e-learning; a computer-based
delivery format and the topic Unit 2 The steps and procedures of Hajj and Umrah is a
procedural topic that includes steps and procedural learning objects.
The model is advantageous in the sense that it focuses on what learners are to know or be
able to do at the end of the lesson, which without this, the succeeding planning and
implementation can be confusing and unsystematic.
From the Dick and Careys theoretical perspectives - it bases on the understanding of the
connection between the stimulus (instructional materials) and the reaction it produces in a
learner. The theory talks about the process of identifying the sub-skills of the learners that
they must have, and the intended outcome (behavior) that must be learned. The theory
focuses on the choice of the stimulus and strategy for each sub-skills development. The
theory also recommends a procedural methodology of instructional development based on
a reductionist model of breaking instruction down into smaller components.
The learning, according to Dick and Carey theory, will be demonstrated in the form of the
ability of the learners to master a set of predictable behavior identified in earlier stage,
which in this case, are the concept, steps and procedures of performing the hajj and
umrah.
The E-learning Instructions
The application was developed using Adobe Flash Professional CS4 and iLife08
Garageband for Mac. The storyboarding was carried out after the completion of the
analyses and design. After creating the storyboard, the scripts were prepared and finally
the audio recording.
Figure 2 : Sample of E-learning screen
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 22
The choice of vocabulary of the instructions was adopted and adapted from the textbook
that was written in Arabic characters known as 'Jawi'. In these e-learning instructions, the
text used standard Roman characters.
Students could navigate the instructions in more than one ways. At the bottom of every
screen page, students could navigate the instruction by clicking on the Back/Next button.
They could also click on the topic list in the left pane. The instructions were designed in
such a way to give the best quality of interface to the users.
The instructions were also developed in dual languages. The instructions content was
maintained in Bahasa Malaysia; similar to the textbook, but as for the navigation menu,
button captions, and other operational instructions; they were presented in English.
The instructions were also furnished with pictures of people in ihram, a picture of Kaabah
and animated transitions to give the maximum value.
Evaluation, Results and Findings
There are 3 types of evaluations involved in this project the entry behavior test,
formative evaluation and summative evaluation tests. All the evaluation steps and
procedures were adapted from the Dick and Carey (2005). Three students were selected
for the one-to-one evaluation, eight for formative small-group evaluations, and thirty for
the summative field test. However, for entry behavior test, Dick and Carey did not specify
the size of the group for the test. Hence, the author decided to follow the small group
model of eight students used in formative evaluation. According to Dick and Carey, any
number of students fewer than eight would not be presentative to the target population and
the data collected would not be sufficient enough for any conclusive recommendations.
Entry Behavior Test - The first test i.e. the entry behavior test was intended to observe the
mastery level of prerequisite skills that the students must have already mastered before
beginning instructions. Dick and Carey (2005) defined the entry behavior as the ability to
have skills in order to learn the new skills included in the instruction.
The entry behavior elements shown in Table 1 were derived from the sub-skills analysis in
the instructional goal analysis phase. This test was carried out before the development of
the instructions began.
Table 1: Entry Behavior Elements
Entry Behavior
1.Students must be able to read al Quran
1.Students must know the technique to search the al Quran content
1.Students must have the basic skill for operating a computer
1.Students must know how to operate the al Quran compact disc
Students must know the concept of halal, haram and mahram
1.Students must know the definition and concept of ihram
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 23
Eight students from Sekolah Menengah Kebangsaan Puchong Utama 1 participated in the
test. The students were asked to respond to six rubric questions (Figure 3) regarding their
prior knowledge in Islamic Studies and their mastery level of computer skills.
Figure 3 : Rubric used to access students entry behavior skills.
The result of this test revealed that all students have high level of computer literacy. The
students also demonstrated their skill in reading al Quran with little to no errors. When
asked to find a verse in the al Quran book, two students could not complete the task
successfully. However, when asked to find a verse using a digital al Quran, all students
demonstrated their ability to explore the application and subsequently find the verse with
minimal effort.
The majority of the students indicated they understood the concept of halal, haram and
mahram very well. One of the students however, indicated that the term 'mahram' was a
new term and could not explain the concept.
Ultimately, a mixed response was recorded for the last entry behavior question - the
understanding of the term ihram. There was only one student who could explain the term
in a complete definition and able to demonstrate the techniques successfully with no help
or guide from the author at all. Three students managed to demonstrate the technique
successfully but could not explain the concept. One student could explain it briefly but
was unable to demonstrate the technique. Another three students could neither explain nor
demonstrate the technique of ihram at all.
Formative Evaluation Test - The formative one-to-one evaluation was to discover any
obvious errors and mistakes in the instruction, whereas the formative small-group
evaluation tried to identify any remaining problems after changes were made to the
instruction following the one-to-one evaluation. Eleven students from Sekolah Menengah
Kebangsaan Desa Tun Hussein Onn participated in the test (three for one-to-one and eight
for small-group).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 24
The instructions criteria were divided into three specific aspects i.e. message, links and
procedures. In message, the evaluations covered aspects such as the vocabulary level,
sentence complexity, message complexity, introductions, elaborations, conclusions and
transitions. In link aspect, the evaluations covered the contexts, examples, analogies,
illustrations, demonstrations, reviews and summaries. And, in procedures - sequence,
transition, pace and variation (Dick and Carey, 2005).
In formative evaluation, we found that:
1. All students agreed that the vocabulary and the use of standard Roman characters in
instructions were accepted as suitable for the students. Students also indicated that the
standard Roman characters were more convenient than Jawi. When asked about personal
preference, students unanimously voted for instructions in standard Roman characters to
Jawi.
2. It was proven during the evaluation that the navigation was working well as intended
when there was no student seeking for assistance on how to use the application although
they used it for the first time.
3. Students agreed with the idea of maintaining the navigation menu, button captions and
other operational instructions in English. When asked, they affirmed that it was the
standard that they were familiar with. They explained that the familiarization with English
operational instructions came from the experience in using Internet, web browsing or
games. When asked if they wanted it to be presented in Bahasa Malaysia, all of them
agreed that it would be 'sound funny', 'awkward' and 'not necessary'.
Summative Evaluation Test - Thirty students participated in the session that was assisted
by the Islamic Studies teacher Ustazah Roslahiah, one technician and one supervising
teacher, Cikgu Nazmi. There were sixteen desktop computers available for the test; each
accommodated two students and one reserved for the teacher. The session was led by
Ustazah Roslahiah who demonstrated the instructions through the projected image on the
white screen. The session was conducted in a synchronous manner due to the fact that only
the computer reserved for the teacher had the loud speakers. The summative field test
was intended to discover the effectiveness of the instructions. In the session the author
distributed a set of questionnaire (a posttest questionnaire) on learners attitude and the
assessment questionnaire and finally followed with an in-depth debriefing session with the
group.
The findings are as follows:
1. Students said that learning through interactive instructions like what they had just
experienced was easy. They said that learning with interactive instructions like this one
gave them more control over the lesson. The students also agreed that they could use this
application at home and learned it individually. However, when asked about the needs for
the teacher to be present during the session, mixed responses were conveyed by the
students. An equal number of students responded 'they do not need teachers to be present'
while the other half was on the opposite side of the idea. Those students who said "no
teachers needed to be present" claimed that the topic was 'too easy'. Others added that the
background narration in the instructions was the 'teacher' itself and that would be
sufficient for learning. On the other hand, students who said teachers should be present
during the session questioned the consequences they might face should there be any
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 25
confusions or difficulties during the session. They said they might need the teachers to
help them with the lesson and answer their questions during the lesson.
2. When asked about the learning pace, more than half of the students said that they felt
they had to 'keep up' with the teacher's pace during the session. They said the distractions
happened when they had to keep looking at the projected screen to keep abreast with the
narration. Alternatively, had the loud speakers attached to their computer, they said they
would be more confident with the session.
3. According to one student, he would like to see more topics from Islamic Studies to be
developed as e-learning because 'the content does not change'. When asked to elaborate, he
continued saying that the facts and contents in Islamic Studies "were referred to sources
like al Quran" - the main source of knowledge that did not and would not change for all
time. For that, he said these e-learning instructions would be useful for a long time.
4. When asked about the improvement of the instructions for the future, majority of the
students recommended for more content in the instructions. They highlighted that learning
with computers like e-learning was fun, easy and engaging. For that, they could learn more
with the same amount of time spent reading the textbook or attending the class.
5. At the end of the session, Ustazah Roslahiah highlighted some factual correction in
the instructions. The correct number of tawaf was actually five and not four. According to
her, the correction was first discovered in 2004 after being referred to Tabung Haji (Hajj
Board of Malaysia) by the Islamic Studies panel teachers. However, the correction was yet
to be carried out because of the high cost for textbook reprinting.
6. Before the session ended, we also noted that too little effort spent on choosing the
graphics has brought down the aesthetic value of the instructions. Not enough references
were also a contributing factor to the quality of the instructions. A new approach of notes
presentation using keywords were not widely accepted by the students who were used to
lengthy words notes presented in traditional classrooms. Students also concerned about the
relationship with teachers and perceived e-learning as a distant part in teachers-students
relationship.
Performance Context
The study was conducted with thirty students in the same session with the summative
evaluation. The objective for this study was to measure the acquired Islamic Studies
knowledge through the use of interactive e-learning instruction. Students were given 10-
item questionnaire. The questionnaire was structured to measure the level of
understanding of each student after they had used the instructions (Neo, Neo, & Xiao-
Lian, 2007). The questionnaire also had open-ended comments section to seek feedback
on the success of the instructions in assisting the students achieving the learning
objectives. Results showed that majority scored high marks between 8 to 10 points (87%)
(full mark = 10 points) in the assessment, indicating very favorable and positive
performance rate from the students in this learning environment.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 26
Conclusion
The study is looking at the perception surrounding the e-learning instructions that was
perceived by teachers (as reported by Hamzah et al., (2009)) as having the risk to be
misleading because of the nature of the topic itself; it does not have an input-output
formula that can be tested like Mathematics and Science subjects.
As a conclusion we can say that:
1. Islamic Studies subject can be developed into e-learning. The key feature for the
development was the type of information contained in the instruction. The topic 2 - Rukun
Haji dan Umrah (The steps and procedures in hajj and umrah) contained a procedural
information object. According to the Reusable Information Object Strategy guidelines
produced by Cisco System, a procedural information object is the type of information that
is "sequential set of steps to be followed by one individual to accomplish a task ". By
using a systematic instructional design model by Dick and Carey, the Islamic Studies
subject has been successfully revisited, restudied and finally remodeled into e-learning.
2. The students' success rate in acquiring the knowledge from the e-learning instructions
depicts the effectiveness of the instructions in delivering the information. The success of
transferring the knowledge through this type of pedagogy validates the Islamic Studies is
in fact suitable for e-learning, with a condition the information bears the required criterion
of information object, i.e. procedural.
3. One of the advantages of e-learning demonstrated during the summative evaluation
session was when Ustazah Roslahiah highlighted the factual correction in the instructions.
The fact that e-learning instructions could make such corrections immediately at a
comparatively minimal cost has given another advantage point to the instructions.
4. Despite the weaknesses as noted during the closure of the session, the learning
objectives were successfully achieved through these e-learning instructions when there
were only two out of thirty students scored below 8 points. The weaknesses recorded from
the evaluation showed the inclination towards the product quality and not the achievement
of the knowledge acquisition.
Recommendations
Throughout the process of designing, developing and producing the e-learning instructions
in this project, a few highlights have been discovered and recorded along the way during
the construction of the instructions and worth considerations for future instructional
design, especially for Islamic Studies subject. Hopefully, this study will provide a path for
further research on the subject for education excellence in Malaysia.
In particular, it is found that:
The results of the entry behavior test showed that the students' computer skill level is
acceptable. The students are also skillful in using the digital al Quran as well as reading.
The students also have sound understanding of the halal, haram and mahram concepts.
However, the students have little to none knowledge about the definition and concept of
ihram. In view with the fact that the ihram is one of the essential parts of hajj and umrah,
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 27
it is recommended that the ihram concept and definition to be included in the syllabus in
the future.
The Dick and Carey Model have proved its efficiency for being a template model for the
development of the instructions. The approach allows interchangeability of activities
around the disciplines in a controlled and systematic ways, progressing forward with a
caution of possibility to go on backward whenever necessary. However, for entry behavior
test, the model did not specifically mention the number of sample that must be used in the
evaluation process. It was the author's own initiative to use eight number of students for
this test based on the statement in the textbook that says "any number of learners fewer
than eight would not be presentative to the target population and the data collected would
not be sufficient enough for any conclusive recommendations". The author perceived the
statement as practical in every small-group test although the statement was actually meant
for formative evaluation.
E-learning is fun and engaging - The majority of the students said during the discussion
that learning through computers is fun. Although the instructions developed the whole
topic 2, students found that the topic was "too short" and expected more. They made it
clear that they could "learn more" with a fun and attractive e-learning instructions like
they had just experienced. With this finding, it is an opportunity for future research to
further discover the "fun and engaging" attributes of e-learning in bestowing the capability
of knowledge empowerment and the retention of skills taught and eventually juxtapose the
advantage of e-learning versus the traditional pedagogy.
References
Blass, E., & Davis, A. (2003). Buiding on Solid Foundations: establishing criteria for e-
learning development. Journal of Further and Higher Education , 27 (3), 227-245.
Fauziah, M. R., & Aminah, I. (2008). Islamic Studies for Form Four (in Bahasa
Malaysia). Dewan Bahasa dan Pustaka.
Hamzah, I., Ismail, A., & Embi, M. A. (2009). The Impact of Technology Change in
Malaysian Smart Schools on Islamic Education Teachers and Students. World
Academy of Science, Engineering and Technology 49 2009.
Neo, M., Neo, T.-K., & Xiao-Lian, G. T. (2007). A constructivist approach to learning an
interactive multimedia course: Malaysian students' perspectives. Australasian
Journal of Educational Technology , 23 (4), 470-489.
Senge, P. (1990). The fifth discipline: The art and practice of the learning organization.
Sisco Systems, Inc. (1999). Cisco Systems Reusable Information Object Strategy:
Definition, Creation Overview and Guidelines (Version 3.0 ed.).
Walter, D., Carey, L., & Carey, J. O. (2005). The Systemaic Design of Instruction (6th
ed.).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 28
MENELUSURI AL-QURAN : PENGGUNAAN ICT DALAM PEMBANGUNAN
MODAL INSAN
Mahyuddin bin Hashim
Fakulti Pengajian Quran dan Sunnah, USIM, Bandar Baru Nilai,
71800 Nilai, Negeri Sembilan.
mahyuddin@usim.edu.my
Abstrak
Kertas kerja ini akan membincangkan topik penggunaan ICT menurut perspektif Al-
Quran. Tidak dinafikan bahawa ICT memainkan peranan yang sangat besar dalam
pembangunan tamadun kini. ICT boleh digunakan untuk kebaikan dan keburukan. Antara
kebaikan ICT ialah sebagai medium dakwah, perbincangan dan soal jawab agama serta
perluasan jaringan perniagaan berdasarkan syarak. Di samping itu, penggunaan ICT boleh
membawa kepada keburukan seperti medium untuk penyebaran fitnah, membuka aib
seseorang, sarang maksiat, jenayah internet, gejala pembaziran waktu dan lain-lain lagi.
Justeru, kebaikan dan keburukan ICT ini akan cuba dihuraikan menurut perspektif Al-
Quran. Objektif utama kertas kerja ini ialah untuk mengemukakan kepada masyarakat
bahawa Islam sangat menitik beratkan kepada akhlak yang mulia dalam penggunaan ICT.
Islam tidak menghalang kemajuan teknologi khususnya dalam bidang komunikasi dan
maklumat selagi mana tidak bercanggah dengan ajaran Ilahi. Sehubungan dengan itu,
diharapkan kertas kerja ini dapat menyumbang ke arah pembangunan modal insan yang
cemerlang di dunia dan juga akhirat.
1. Pendahuluan:
Information and Communications Technology (ICT) adalah merupakan salah satu
daripada teknologi yang sangat penting di zaman sekarang. Perkembangannya yang cukup
pesat sesuai dengan arus perubahan zaman menjadikannya teknologi yang jika tidak
dikuasai dianggap sebagai ketinggalan zaman. ICT telah merubah cara kehidupan kita
seharian. Ianya telah merubah cara kita berkomunikasi, berinteraksi dan seterusnya cara
kita mendapatkan maklumat atau hiburan. Semua maklumat yang kita ingin perolehi
berada di hujung jari dan komunikasi dapat dijalankan dengan cara yang lebih mudah.
Pun begitu, timbul polemik sejauh mana ICT mampu memberi kebaikan kepada
Islam berbanding keburukan yang wujud di dalamnya. Di dalam kertas kerja ini, penulis
sedaya upaya akan membentangkan tentang kebaikan dan keburukan penggunaan ICT
berdasarkan kepada dalil Quran bagi melihat sejauh mana ia bertepatan atau bertentangan
dengan Islam.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 29
2. Kebaikan Penggunaan ICT:
Di antara kebaikan penggunaan ICT ialah:
2.1. ICT sebagai medium penyebaran dakwah:
Antara kelebihan ICT ialah penyebaran maklumat dapat disampaikan dengan cepat
dan mudah. Penggunaan perisian gambar dan suara menambahkan lagi kesan yang lebih
maksimum kepada pengguna ICT untuk menerima dan mengolah maklumat tersebut.
(Tibi: 1999). Kelebihan ini sangat berguna untuk penyebaran dakwah. Jika sebelum ini
dakwah yang ingin disampaikan memerlukan masa dan tempat, maka dengan adanya
kemudahan ICT ini, perkara tersebut dapat diatasi. Penerangan tentang kelebihan Islam,
mengajak kepada kebaikan, menolak perkara mungkar, menjawab keraguan dan
kesamaran dapat dilaksanakan dengan lebih cekap, efisyen dan efektif. Di samping itu, ia
juga dapat disampaikan kepada lebih ramai pendengar dan pembaca yang menjadi
pengguna ICT. (Ahmad Abdul Hamid. 2009).
Contoh penggunaan ICT sebagai medium dakwah ialah sebagaimana yang terdapat
dalam laman web ad-Dakwah al-Islamiyyah yang memuatkan pelbagai penulisan
termasuk ceramah-ceramah para Ulama yang menceritakan keindahan Islam,
perbandingan agama dan lain-lain lagi.
Kebaikan penggunaan ICT untuk dakwah adalah bertepatan dengan firman Allah
s.w.t :
_: _|| _,,. ,, .>>'!, Ls.l ..>' l..> _.l!, _> _.> | ,`, > `ls _.,
_. _s .,,. > `ls _...l!, __
Maksudnya:
Serulah ke jalan Tuhanmu (Wahai Muhammad) dengan hikmat kebijaksanaan dan nasihat
pengajaran yang baik, dan berbahaslah dengan mereka (yang Engkau serukan itu)
Dengan cara yang lebih baik; Sesungguhnya Tuhanmu Dia lah jua yang lebih mengetahui
akan orang yang sesat dari jalannya, dan Dia lah jua yang lebih mengetahui akan orang-
orang yang mendapat hidayah petunjuk. (Surah An-Nahl: 125)
Menurut Imam Fakhruddin Ar-Razi di dalam tafsirnya, di antara maksud 'hikmat'
di dalam Quran ialah melakukan dengan tepat dan betul.(Ar-Razi. 2000) Dapat difahami
bahawa maksud 'melakukan dengan tepat dan betul adalah memberi makna yang luas yang
merangkumi juga penggunaan ICT. Penggunaan ICT adalah tindakan yang tepat dan betul
untuk menyebarkan dakwah pada zaman moden ini.
2.2. ICT sebagai perpustakaan bagi pelbagai disiplin ilmu Islam:
ICT juga boleh berperanan sebagai perpustakaan bagi pelbagai disiplin ilmu Islam.
Pelbagai bentuk tulisan boleh dapati sama ada artikel, buku, majalah, surat khabar dan
lain-lain yang boleh dimuat turunkan bagi dijadikan sebagai rujukan penulisan ataupun
untuk penambahan ilmu pengetahuan.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 30
Islam sangat menggalakkan umatnya agar menimba ilmu kerana ia adalah
keistimewaan manusia berbanding makhluk yang lain termasuk malaikat sebagaimana
firman Allah s.w.t:
l. :, ,!.- !l . .. _ls >.l.l _!1 _.:,. ,!.`.!, ,.> | .. _,... _
l! ,..>,. l. !.l | !. !...ls ,.| . `,l-l `,>>' __
Maksudnya:
Dan Ia telah mengajarkan (ilmu kepada) Nabi Adam akan segala nama benda-benda dan
gunanya, kemudian ditunjukkannya kepada malaikat lalu Ia berfirman: "Terangkanlah
kepadaKu nama benda-benda ini semuanya jika kamu golongan yang benar". Malaikat itu
menjawab: "Maha suci Engkau (Ya Allah)! Kami tidak mempunyai pengetahuan selain
dari apa yang Engkau ajarkan kepada kami; Sesungguhnya Engkau jualah yang Maha
Mengetahui, lagi Maha Bijaksana".( Surah al-Baqarah: 31-32)
Menurut Prof. Dr. Fadhlu Hasan Abbas, tujuan ayat di atas adalah untuk
menerangkan kelebihan ilmu yang Allah berikan kepada manusia berbanding makhluk
yang lain (Fadhlu Hasan. 2000). Justeru, penggunaan ICT sebagai gedung ilmu
pengetahuan pastinya bertepatan dengan tuntutan Islam yang memandang tinggi pada
ilmu.
Contoh penggunaan ICT sebagai gedung ilmu ialah perisian al-Jamie' al-Kabir li
Kutubi at-Turath wa al-Arabi. Perisian ini mengandungi 1778 kitab dalam pelbagai
disiplin ilmu Islam seperti Tafsir dan ulumnya, Hadis Nabawi dan biodata perawi, fiqh dan
usulnya, Aqidah, sejarah, akhlak dan lain-lain lagi. Perisian ini memberikan kemudahan
kepada penggunanya untuk merujuk kitab-kitab lama dalam bahasa Arab yang sukar di
dapati di pasaran pada hari ini.
2.3. ICT sebagai penghubung dengan Ulama bertanyakan fatwa:
Di antara kelebihan internet juga adalah untuk berhubung dengan seseorang bagi
tujuan perkongsian pandangan, pertanyaan dan lain-lain lagi. (Tibi. 1999). Kelebihan ini
boleh digunakan untuk bertanya kepada para ulama tentang sesuatu keraguan atau
kemusykilan yang timbul dalam kehidupan seharian.
Islam sangat menggalakkan umatnya bertanya apatah lagi dalam perkara agama
kepada para ulama. Ia jelas sebagaimana firman Allah s.w.t :
l:`. _> | `.. .-. __
Maksudnya:
Bertanyalah kamu kepada orang-orang yang berpengetahuan agama jika kamu tidak
mengetahui.( Surah an-Nahl: 43)
Imam Qurtubi di dalam tafsirnya menyatakan bahawa maksud asal orang-orang
yang berpengetahuan agama ialah ahli kitab yang beriman kepada Allah. Dalam ayat di
atas Allah s.w.t telah menyuruh musyrikin Mekah bertanya kepada ahli kitab yang
mukmin adakah para Nabi sebelum ini adalah manusia atau malaikat. Ini adalah kerana
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 31
musyrikin Mekah mengingkari kenabian Muhammad s.a.w. kerana baginda adalah
seorang manusia dan mereka inginkan Allah mengutuskan malaikat sebagai rasul.
(Qurtubi. t.t).
Jelasnya, Allah s.w.t di dalam ayat di atas menyuruh agar bertanya kepada orang
yang berpengetahuan agama tentang kemusykilan dan keraguan yang timbul. Medium
yang terbaik untuk tujuan tersebut pada zaman moden ini adalah ICT.
Contoh penggunaan ICT sebagai penghubung dengan para ulama ialah
sebagaimana yang terdapat dalam laman web islamonline. Laman web ini menyediakan
pakar-pakar dalam agama untuk menjawab semua persoalan yang ditimbulkan seperti Dr.
Yusof al-Qaradhawi, Syeikh Atiyyah Soqar, Prof. Dr. Ali Jumaah dan lain-lain lagi.
2.4. Dapat mengikuti berita tentang umat Islam di seluruh dunia:
Melalui ICT, seseorang dapat mengetahui tentang berita yang berlaku di seluruh
dunia dengan cepat dan efisyen. Kesengsaraan dan kesedihan di samping kegembiraan
umat Islam di seluruh dunia dapat dikongsi bersama dengan saudara seIslam yang lain
melalui ICT. Perkongsian ini pastinya membawa kepada hubungan dan ukhuwwah yang
lebih erat di antara umat Islam. (Ahmad Abdul Hamid. 2009). Perkara ini adalah
bertepatan dengan firman Allah s.w.t:
!..| `...l :>|
Maksudnya:
Sebenarnya orang-orang yang beriman itu adalah bersaudara.(Surah al-Hujurat: 10)
`...l ....l .-, ',!,l _-,
Maksudnya:
Dan orang-orang yang beriman lelaki dan perempuan, setengahnya menjadi penolong
bagi setengahnya yang lain. (Surah at-Taubah: 71)
Mengikut Imam Ibnu Kathir dalam tafsirnya, maksud 'awliya' dalam ayat di atas
ialah tolong menolong dan bantu membantu. (Ibnu Kathir. 1401H). Justeru, ICT
berperanan untuk mencapai tujuan tersebut pada zaman moden ini.
2.5. Perluasan jaringan perniagaan melalui E-Dagang:
Perkembangan ICT turut membawa perubahan kepada sektor perniagaan. ICT
digunakan sebagai salah satu medium perniagaan yang disebut sebagai E-Dagang atau E-
Commerce (Internet Base Business). Perkembangan teknologi di dalam sektor kewangan
ini ternyata merupakan elemen yang amat penting di dalam industri perkhidmatan
kewangan kerana kewujudan teknologi ini membawa arus perubahan kepada cara
perniagaan serta penghantaran barangan kepada para pengguna. Dengan kewujudan
revolusi multimedia ini juga, bukan sahaja maklumat yang berbentuk data yang boleh
dihantar bahkan grafik, video serta suara juga turut boleh dihantar dari satu tempat ke satu
tempat yang lain di seluruh dunia dengan cara yang pantas. Bagi syarikat-syarikat atau
agensi samada kerajaan atau swasta, ICT mempunyai banyak kelebihan di dalam mengatur
dan menyusun pengaliran wang serta perbelanjaan kerana melalui ICT ini mereka boleh
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 32
memantau segala perbelanjaan yang dibuat, menjangka keperluan di masa akan datang,
mengatur langkah berjimat cermat dan lain-lain. Bagi sistem perbankan pula selain dari
menyediakan perkhidmatan yang lebih efektif kepada pelanggan, pihak institusi kewangan
juga berkemampuan untuk memantau keperluan pelanggan dari masa ke semasa secara
automatik apabila keperluan pelanggan berubah kerana sebab-sebab tertentu seperti
bertambahnya pendapatan bulanan, penukaran kenderaan, insuran dan lain-lain. (Nik
Rahim. 2009).
Contoh penggunaan ICT dalam perniagaan ialah penyediaan perkhidmatan
perdagangan saham. Amsecurities Sdn Bhd sebagai contoh adalah salah satu syarikat
perbankan yang menyediakan perkhidmatan perdagangan saham secara Islam melalui
internet di laman webnya iaitu www.amsecurities.com. Melalui laman web ini, para
pelanggan boleh berurusan di dalam pasaran saham di Bursa Saham Kuala Lumpur
(BSKL) secara aktif. (Nik Rahim. 2009).
Islam secara umumnya tidak pernah menghalang apa sahaja bentuk medium yang
digunakan dalam perniagaan asalkan perniagaan yang dijalankan halal dan tidak
bertentangan dengan hukum syarak. Firman Allah s.w.t :
_> < _,,l > ,l
Maksudnya:
Allah telah menghalalkan berjual-beli (berniaga) dan mengharamkan riba. (Surah al-
Baqarah: 275)
Menurut Imam Qurtubi dalam tafsirnya, kebanyakan ulama berpandangan bahawa
semua jenis jual beli dihalalkan dalam Islam dengan apa bentuk cara sekali pun kerana
keharusan dalam ayat di atas berbentuk umum. Walaubagaimana pun Allah
mengkhususkan keharusan yang umum tersebut dengan perkara yang haram seperti
riba.(Qurtubi. t.t). Ini bermakna penggunaan ICT dalam perniagaan diharuskan dalam
Islam selagi mana tidak dilakukan perkara-perkara yang diharamkan oleh Allah dalam
perniagaan.
3. Keburukan Penggunaan ICT
Di antara keburukan penggunaan ICT pula ialah:
3.1. Pembaziran waktu dan ketagihan internet:
Pembaziran waktu adalah salah satu kesan penggunaan ICT. Mengikut kajian yang
dilakukan oleh sebuah pertubuhan di Amerika mendapati bahawa purata jam seminggu
yang dihabiskan oleh pengguna internet untuk melayari perkara yang tidak berfaedah ialah
sebanyak 38 jam seminggu. Berdasarkan kepada borang kaji selidik yang diedarkan di
negara-negara Teluk pula mendapati bahawa 68 % pengunjung Cyber Cafe menghabiskan
lebih daripada 3 jam sehari untuk melayari internet. Bahkan ada di antara mereka yang
menghabiskan masa 10 jam sehari untuk tujuan tersebut. Mengikut pemilik Cyber Cafe
tersebut, ada di antara pengunjung menghabiskan masa melayari internet daripada
tengahari hingga ke Subuh hari yang seterusnya. (Adel. t.t).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 33
Daripada maklumat di atas, jelas bahawa pengguna internet telah membazirkan
waktu melayari internet dengan perkara yang tidak berfaedah. Bahkan ada di antara
mereka yang ketagih dengan internet. Berdasarkan kajian yang dibuat oleh sebuah
pertubuhan di Amerika, di dapati bahawa 10 % pengguna internet menghadapi perasaan
ketagih untuk melayari internet. Ini bermakna mereka lebih suka untuk hidup bersendirian,
jauh daripada masyarakat dan hidup dengan hati yang terikat dengan dunia khayalan dan
keraguan melalui perhubungan mereka dengan orang yang tidak dikenali. Oleh kerana
keperluan yang mendesak, pihak pertubuhan terpaksa menjalankan pelbagai aktiviti untuk
mengubati ketagihan internet ini agar mereka dapat kembali kepada kehidupan normal
mereka bersama masyarakat. (Adel. t.t).
Pembaziran waktu dan ketagihan internet ini pastinya berlawanan dengan ajaran
Islam yang menolak umatnya melakukan sesuatu yang sia-sia. Firman Allah s.w.t:
_ _.: l :| '. -ll!, '. !. __
Maksudnya:
Dan mereka (yang diredhai Allah itu ialah orang-orang) yang tidak menghadiri tempat-
tempat melakukan perkara-perkara yang dilarang, dan apabila mereka bertembung
dengan sesuatu yang sia-sia, mereka melaluinya dengan cara membersihkan diri
daripadanya. (Surah al-Furqan: 72)
Mengikut Imam Fakhrulrazi dalam tafsirnya, maksud perkara yang sia-sia ialah
setiap perkara yang wajib dibuang dan ditinggalkan. (Ar-Razi. 2000). Justeru, penggunaan
ICT bagi tujuan yang sia-sia termasuk dalam perkara yang mesti ditinggalkan oleh umat
Islam.
3.2. Penyebaran fitnah dan pembukaan aib seseorang:
Antara keburukan penggunaan ICT ialah ia sebagai medium untuk penyebaran
fitnah dan pembukaan aib seseorang. Sifat memfitnah seseorang adalah sifat orang
munafik sebagaimana firman Allah s.w.t:
_l `l .., 1...l _ _ ,l "_. _>.l _ .,..l .,-`.l , .
.'!> !, | ,l _
Maksudnya:
Demi sesungguhnya, jika orang-orang munafik, dan orang-orang yang ada penyakit (syak
ragu-ragu) dalam hatinya, serta orang-orang yang menyebarkan berita-berita dusta di
Madinah itu tidak berhenti (dari perbuatan jahat masing-masing), nescaya Kami akan
mendesakmu memerangi mereka; sesudah itu mereka tidak akan tinggal berjiran
denganmu di Madinah lagi melainkan sebentar sahaja.(Surah al-Ahzah: 60)
Imam Qurtubi dalam tafsirnya berkata bahawa sebahagian para Ulama menyatakan
maksud "menyebarkan berita-berita dusta" ialah menyebarkan fitnah dan kebatilan.
(Qurtubi. t.t). Ini jelas menunjukkan bahawa menyebarkan fitnah adalah dilarang dalam
Islam. Termasuk dalam perkara yang dilarang juga ialah membuka aib seseorang. Firman
Allah s.w.t:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 34
..> .-, >.-`, !.-, > `.> _!, `>l ,> !.,. :..>>
Maksudnya:
Dan janganlah kamu mengintip atau mencari-cari kesalahan dan keaiban orang; dan
janganlah setengah kamu mengumpat setengahnya yang lain. Adakah seseorang dari
kamu suka memakan daging saudaranya yang telah mati? (Surah al-Hujurat: 12)
Maksud mengumpat di dalam ayat di atas menurut Imam Suyuti dalam tafsirnya
ialah menyebut sesuatu perkara yang tidak disukai oleh tuannya walaupun ia benar-benar
wujud dan berlaku. (Suyuti. t.t). Mendedahkan keaiban seseorang menggunakan ICT
pastinya menambahkan lagi keburukannya kerana ia diketahui oleh jumlah yang lebih
ramai yang menggunakan ICT.
3.3. Penyebaran ajaran atau ilmu yang salah berkenaan Islam:
Di antara penyalahgunaan ICT ialah penyebaran ajaran atau ilmu yang salah
berkenaan Islam. Terdapat terlalu banyak penulisan, artikel, buku dan lain-lain yang
memuatkan pemikiran yang menyeleweng dan berlawanan dengan prinsip Islam yang
disebarkan kepada orang ramai melalui medium ICT.
Sebagai contoh, telah tersebar di dalam internet apa yang dinamakan sebagai Al-
Furqan Al-Jadid. Ia dicipta sebagai ganti kepada Al-Quran Al-Karim yang dilihat oleh
Amerika dan Yahudi sebagai kitab yang menggalakkan penganutnya melakukan
keganasan dan melahirkan perasaan benci kepada penganut agama lain. Di dalam kitab
yang baru ini, ia telah membuang sebanyak 21% daripada ayat-ayat di dalam Quran yang
berkaitan dengan jihad, penjagaan diri daripada melakukan perkara yang haram dan
kebersihan. Bahkan, ayat-ayat di dalam Quran berkenaan dengan ibadat, akhlak dan
keperibadian muslim telah diubah bagi menepati budaya dan thaqafah barat. Kitab ini
ditulis dengan tulisan Uthmani dan bentuk muka suratnya juga sama dengan muka surat
al-Quran untuk mengelirukan umat Islam. (Al-Furqan al-Jadid. t.t).
Perbuatan ini adalah sama sebagaimana yang dilakukan oleh ahli kitab yang
mengubah kitab Taurat. Allah s.w.t telah mencela mereka dengan firmannya:
_, _l ,.>, ..>l .,!, . l1, ..> _. ..s < .:,l ., !... ,l _, l
!.. ,. ,., _, l !.. ,.>, __
Maksudnya:
Kecelakaan besar bagi orang-orang yang menulis KitabTaurat dengan tangan mereka
(lalu mengubah Kalam Allah dengan rekaan-rekaan mereka), kemudian mereka berkata:
"Ini ialah dari sisi Allah", supaya mereka dengan perbuatan itu dapat membeli
keuntungan dunia yang sedikit. maka kecelakaan besar bagi mereka disebabkan apa yang
ditulis oleh tangan mereka, dan kecelakaan besar bagi mereka dari apa yang mereka
usahakan itu.(Surah al-Baqarah: 79)
Menurut Imam Baghawi dalam tafsirnya, pendeta-pendeta Yahudi sangat takut
kehilangan tempat mencari rezeki dan kuasa yang ada pada mereka apabila Rasulullah
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 35
s.a.w berhijrah ke Madinah. Mereka telah mengubah kitab Taurat yang menceritakan sifat
Nabi akhir zaman yang mempunyai wajah yang cantik, rambut yang kemas, memakai
celak di mata dan sederhana tingginya untuk menghalang orang Yahudi masuk Islam.
Apabila orang Yahudi bertanya kepada mereka tentang sifat Nabi akhir zaman, mereka
bacakan kitab Taurat yang telah diubah dan orang Yahudi mendapati sifat tersebut tidak
sama dengan sifat yang ada pada Nabi Muhammad s.a.w sehingga menyebabkan mereka
tidak mahu beriman. (Baghawi. t.t).
3.4. ICT sebaga alat untuk melakukan jenayah:
ICT juga telah digunakan sebagai alat untuk melakukan jenayah. Contoh
penyalahgunaan tersebut ialah sebagaimana yang berlaku kepada seorang wanita warga
Filipina yang datang ke Malaysia untuk bertemu dengan teman laman sosial di internet.
Walaubagaimana pun kedatangannya tersebut mengundang padah apabila dia dikurung di
sebuah unit kondominium Mentari Court Petaling Jaya dan dijadikan tebusan oleh empat
lelaki warga Afrika. Pun begitu, suspek tidak berjaya untuk mendapat wang tebusan.
Mangsa telah dibebaskan di tepi jalan berhampiran Bandar Sunway dengan kesan
kecederaan di badan dipercayai akibat dipukul. (Utusan Malaysia. 22 Disember 2010).
Islam sememangnya menolak perlakuan jenayah sebagaimana firman Allah s.w.t:
_,. :!.l _ _ | < > _...l __
Maksudnya:
Dan janganlah engkau melakukan kerosakan di muka bumi; Sesungguhnya Allah tidak
suka kepada orang-orang yang berbuat kerosakan.
Imam Nasafi berkata dalam tafsirnya bahawa maksud melakukan kerosakan di
dalam ayat di atas ialah melakukan kezaliman, dosa dan jenayah. (Nasafi. t.t).
3.5. ICT sebagai sarang maksiat:
Di antara keburukan ICT ialah ia adalah sarang maksiat. Gambar-gambar yang
tidak senonoh, video lucah, lagu-lagu yang melalaikan dan lain-lain lagi adalah perkara
yang tidak boleh dipisahkan daripada ICT. Islam mengharamkan maksiat dan hiburan
yang melalaikan berdasarkan kepada firman Allah s.w.t:
_. _!.l _. _.:, l ,.>l _.`,l _s _,,. < ,-, l. !>.>`., '> ,.l` >
',.s _,. _
Maksudnya:
Dan ada di antara manusia: orang yang memilih serta membelanjakan hartanya kepada
cerita-cerita dan perkara-perkara hiburan yang melalaikan; yang berakibat menyesatkan
(dirinya dan orang ramai) dari agama Allah dengan tidak berdasarkan sebarang
pengetahuan; dan ada pula orang yang menjadikan agama Allah itu sebagai ejek-ejekan;
merekalah orang-orang yang akan beroleh azab yang menghinakan.(Surah Luqman: 6)
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 36
Maksud lahwa al-hadis mengikut pandangan Imam Qurtubi dalam tafsirnya ialah
nyanyian dan lagu yang dilarang oleh Quran dan Sunnah. (Qurtubi. t.t).
Kesimpulan
Berdasarkan kepada keterangan di atas, kita dapat membuat kesimpulan bahawa
penggunaan ICT mempunyai kebaikan dan keburukannya mengikut perspektif Quran. Ini
bermakna Islam tidak menghalang penggunaan ICT selagi mana ia memberi faedah
kepada umat Islam, tetapi mengharamkannya jika digunakan untuk keburukan. Ia adalah
seumpama pisau. Jika digunakan untuk kebaikan seperti untuk menyembelih binatang
ternakan, memasak dan lain-lain lagi maka Islam tidak menghalang penggunaannya.
Tetapi jika digunakan untuk keburukan seperti membunuh nyawa yang tidak berdosa,
mencedera dan mengugut orang maka Islam mengharamkan penggunaannya.
Justeru, dapat difahami bahawa Islam sangat menitik beratkan kepada akhlak yang
mulia dalam penggunaan ICT. Islam tidak menghalang kemajuan teknologi khususnya
dalam bidang komunikasi dan maklumat selagi mana tidak bercanggah dengan ajaran
Ilahi. Sehubungan dengan itu, diharapkan kertas kerja ini dapat menyumbang ke arah
pembangunan modal insan yang cemerlang di dunia dan juga akhirat.
Bibliografi
Baghawi. (n.d) Tafsir al-Baghawi.
Darul Makrifah Beirut.
Fadhlu Hasan Abbas (Prof. Dr.). (2000)
Qosos al-Quran al-Karim. Darul Furqan Jordan. Cetakan pertama.
Abu al-Fida' Ismail bin Umar bin Kathir ad-Dimasyqi. (1401).
Tafsir al-Quran al-Azim. Darul Fikr Beirut.
Nasafi. (n.d)
Tafsir an-Nasafi.
Abu Abdullah Muhammad bin Ahmad al-Ansari. (n.d)
Al-Jamie' li Ahkam al-Quran. Darul Sya'bi Kaherah.
Al-Razi, Fakhruddin Muhammad bin Umar at-Tamimi. (2000).
At-Tafsir al-Kabir . Darul Kutub al-Ilmiah Beirut. Cetakan pertama.
al-Suyuti, Muhammad bin Ahmad et al. (n.d)
Tafsir al-Jalalain. Darul Hadis Kaherah. Cetakan pertama.
Adel Muhammad (n.d) Sabu Mafasid lil Internet
From the World Wide Web: http://www.bab.com
Ahmad Abdul Hamid (2009, Nov) al-Internet wa Atharuha al-Ijabiyyah.
from website: http://majles.alukah.net
Dr. Munas Tibi (2009, April), Ijabiyyah Syabakah Internet.
from website: http://yomgedid.kenanaonline.com
Dr. Nik Rahim Nik Wajis (2009, Ogos) E-Dagang Menurut Perspektif Islam
From website: http://zakat.com.my
World Wide Web: www.alyaseer.net
World Wide Web: www.islamonline.net
World Wide Web: http://www.eld3wah.net
Utusan Malaysia. Hasrat wanita temui teman Internet bawa padah. 22 Disember 2010
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 37
MATHEMATICS COURSEWARE FOR AUTISM CHILDREN (NUMBERS)
Ibrahim Ahmad, Faaizah Shahbodin & Aniza Othman
Media Interactive Department
Faculty of Communication & Information Technology
Universiti Teknikal Malaysia Melaka (UTeM),
Durian Tunggal,Melaka
ibrahim@utem.edu.my, faaizah@utem.edu.my, aniza@utem.edu.my
ABSTRACT
Children with autism are socially impaired and usually having problem with verbal and non-
verbal communication. The concept of Behaviorism learning theory is seen as an innovative
pedagogy to be used in producing mathematics (Numbers) courseware for autism children.
Behaviorism learning theory focuses on a behavioral pattern being repeated until it becomes
automatic. The concepts of Drill and Practices is chosen in developing the Mathematics
courseware to learn number. This prototype is specially developed for moderate level of
autistic children targeted for primary schools which covered syllabus of Mathematics
Component in the Huraian Kurikulum Pendidikan Khas Bermasalah Pembelajaran (PKBP)
set by Ministry of Education. In our research, Behaviorism learning theory and multimedia
technology have been blended in enhancing learning performance among autistic child.
Moreover, very little empirical research has been conducted to integrate Behaviorism
learning theory into learning courseware for autistic learners. Testing and evaluations have
been made with autistic children and teachers from primary school in Ujong Pasir, Melaka
and Autism Intervention Centre (NASOM). We aim to share the positive feedback from the
tester and the possibility to commercialized the research project.
Keywords: Autism, Multimedia Courseware, Mathematics, Behaviorism learning theory
INTRODUCTION
Nowadays, computers are increasingly present at the early stage of education settings.
Computer offers unique advantages in teaching. The unique advantages that are formed by
computers and learning methods are; they could emphasized practical learning, where
teachers were trained to use various teaching aids, namely educational courseware, integrate
computer-based technology into the educational curriculum in such a way improving the
learning process. This could be true for children, who received normal education.
However, there is no similar educational courseware been designed and developed for
particular learning disabilities such as Autism Spectrum Disorders (ASD). Therefore, this
research is carried out to establish an educational courseware prototype which can be a basic
electronic teaching and learning tools to help teachers and student with autism disorder in
primary schools to a life path to normalcy.
According to Siegel B. [2], Autism is a pervasive developmental disorder characterized by
impairments in social interaction, communication, and restricted, repetitive, and stereotypic
patterns of behaviors, interests, and activities. Symptoms of autism can be broadly grouped
into three domains
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 38
- Social Autistic Learning Disabilities
- Communicative Autistic Learning Disabilities
- Non-Social Autistic Learning Disabilities
As own efforts to get clear understanding, autism is a life-long developmental disability that
prevents people from understanding what they see, hear, and otherwise sense. It is a
development disorder characterized by unusual, repetitive, or severely limited activities and
interests, problems with verbal and non-verbal communication and impaired social
interaction.
According to Williams M. [3], people learn using all five senses whereas 83% through the
sense of sight, 10% through the sense of hearing, 4 % through smell, 2 % through touch and
finally 1% through taste. Since so much learning is done involving the sense of sight, this
ongoing prototype should capitalize on this fact and use it to the fullest advantage in helping
autism students to learn more effectively. Multimedia elements consist of texts, graphic,
animations, video and sound effects.
Since this on-going prototype is focused on children with autism, psychologists have shown
that they can often improve the quality of life for many children with autism and help them to
integrate more successfully into society using behavioral programs. The approach to
treatment for children with autism is termed Discrete Trial Training, which is also known as
Applied Behavioral Analysis (ABA) or Lovaas Method. DTT/ ABA is a procedure that uses
the principles of learning theory to improve behaviors that are deemed socially significant
and it is based on the theory of behaviorism. The use of BTT/ABA approach to treat children
with autism was pioneered in the late 1960s and 1970s by Dr. Ivar Lovaas at UCLA. Lovaas
was well trained as a Skinnerian behavioral psychologist.
Discrete Trial Training Approach involves a series of distinct repeated lessons or trials taught
one to one. Each trial consists of an antecedent, a directive for the individual to perform
action, or the reaction based on the response of the person. DTT has been used to successfully
increase IQ and cognitive skills and has also been shown to have long-term success
introduced by Lovas in 1993. Children with autism often face many deficits and difficulties
in learning. According to Siegel B. [2], below are the components of Discrete-trial training
approach which can help to compensate for difficulties in learning for autism children.
ANALYSIS FROM THE CASE STUDIES
The behaviorism learning theory of Skinner in argues that the use of technology in teaching
can increase learned behavior by organizing learning objectives, increasing the frequency of
positive reinforcement, customizing the learning experience and freeing teachers from
repetitive teaching [4].
An analysis of user needs must be done in order to design and develop the courseware to
meet those needs. In designing and developing this courseware prototype, the problem of
autism children in learning and teaching are the most important that need to know and
understand. Some interviews and study cases of autism children have been done [1].
Result from the interviews that has been done with Encik Anuar bin Mohd Said, who is a
special education officer in Special Needs Unit at Melaka State Department of Education, he
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 39
said that individuals with autism have extremely difficulty in learning language, social skills
and in relating to people. Below are the characteristics of autism children that have been
summarized from the interviews:
- Display indifference
- Does not play other children
- Talk incessantly about one topic
- Echolalia, copies like parrot
- No eye contact
- Some can do thing very well and quickly but not tasks involving social understanding
- Variety is not the spice of life
- One-sided interaction and lack of creative
According to En Izhar Ibrahim, his son Izzadin Fikri, 12 years old is having asperger which is
one of the spectrums in autism. He gives more prone to academic but talks less. Most of the
times, he only spend in his own world. At first, they do not detect or realize that their son is
having autism. But then the problem started to arise when they send his son to the
kindergarten. The teacher started complaining that he did not give any respond during the
learning session. He will not look at what the teacher teaches in front but the homework
which was given to him is completed. After he meets the doctor to identify his son problem,
the doctor admits that his child has a problem like an autism children.
Two case studies have been conducted in special education of Malacca Bukit Cina Primary
School in order to know and understand the current levels of performance of autism student.
In the first case study, Siew Ting, who is 9 years old and a female autism student, able to
answer and response simple questions such as her favorite colors and name. She looks normal
like other normal students. She can follow simple instructions and response to the questions.
She looks to the people, but there is no eye contact and have flat affect with the people talk to
her. According to her teacher, Madam Rose Mary, she is able to learn things but lacks of
social interaction with her friends.
In the second case study, Mohammad Danial, who is 7 years old and a male autism student,
able to answer his name, but he is keep on repeating his name until his teachers touch her
neck, then he will stop mentioned his name. He can answer, understand and response to the
questions. He engages in repetitive body movements such as hand clipping and displays a
narrow range of emotion.
THE DEVELOPMENT OF ASSISTIVE INTERACTIVE LEARNING FOR AUTISM
CHILDREN
Based on the finding from case studies mentioned, a project for an assistive interactive
learning for autism children named Math for Autism has been developed. In this project,
the researcher tries to integrate the practice and drill technique with the Discreet Trial
Training (DTT) approaches in this interactive courseware. The objectives for this interactive
courseware are to assist children to understand the concept of number, acquire and apply the
basic skills in mathematics in their life. Figure 1 shows the course map for the whole
courseware that has been developed.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 40
Figure 1: The course map of Math for Autism
The characteristics chosen from the DTT Approach and try to apply into the courseware are:
Cause-effect learning and observational learning
Children with autism typically have a great deal of difficulty in "picking things up" from their
environments. To compensate them, DTT teaches skills and behaviors explicitly, without
relying on these areas of difficulty. Using discrete trials a full motor - prompting, the child is
presented with a simple task (like touching nose).
Attention
Many children with autism begin a program with rather short attention spans. In DTT, tasks
are broken down into short, simple trials. At the starting of a program, interactions may only
be a few seconds in length. As the child's attention span increases, the length of the
interactions increases accordingly as depicted in Figure 2: Bedroom setting.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 41
Figure 2: Bedroom setting
Motivation
Children with autism may not be as motivated to work as other children might be. DTT
attempts to build this motivation by rewarding performance of desired behaviors and
completion of tasks with tangible or external reinforcement (food, toys, and time to play).
That external reinforcement is paired with social praise with a hope that eventually praise will
become as reinforcing as the treats. Figure 3 and Figure 4 below shows one of the learning
activities to motivate student to count the number by using game. Students also will be asked
to write and spell the number as shown in Figure 5 and 6 respectively.
Figure 3: Counting Time
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 42
Figure 4: Game Zone
Stimulus control
In DTT the presented stimuli (typically instructions from a teacher or parent) is clear and
relatively consistent. The child is given rewards only for behaviors in response to those
stimuli so that eventually he comes to understand that certain stimuli are probably more
deserving of his attention than others.
Generalization
Generalization, the application of a behavior or skill across a number of environments or to a
number of related behaviors, is typically quite difficult for children with autism.
Consequently, the instructions in good DTT programs are designed to change over time, in
content (the verbiage of the instruction) and context (who is giving the instruction, where and
when it is being given).
Figure 5: Write Number
Communication
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 43
Often in children with autism, both expressive and receptive languages are deficient.
Teaching that relies on a great deal of verbiage from the teacher, then, is often too difficult
for these children. The instructions given in discrete trials are simple, concrete, and clearly
provide only the most salient information, especially at first. The DTT/ABA approach
presents several advantages for children with autistic spectrum disorders. It uses clear
behavioral principles to establish a learning contract that for many parents of children with
autistic spectrum disorders provides them with their first opportunity to teach their child
directly and effectively. As the conclusion for this section, this approach can be applied in
developing an educational courseware prototype for children with autism.
Figure 6: Spell the Number
CONCLUSION
Designing and producing multimedia based courseware as a learning tool especially for
students with learning disabilities is not an easy job. It needs a deep study to search a suitable
approach, technique and method to cater various types of disability students. One of the
suitable approaches for autism students is using a Discrete Trial Training Approach.
References
[1] Ibrahim Ahmad et al. (2009) The Designing of Interactive CD Learning for Treatment
of Autism Children, Proceeding on 14th International Conference on Education,
Universiti Brunei Darussalam.
[2] Siegel B (2003). Helping Children with Autism Learn PHD. Oxford University.
[3] William M (2000). Integrating Technology into Teaching and Learning Concepts and
Application. New York. Prentice Hall.
[4] Gary A.B (2003). The knowledge Medium: Designing Effective Computer Based
Learning Environments. California State University, Channel Island.
[5] Abdul Latif A.R (2007). Austime, Satu Pengenalan dan Pengalaman. Kuala Lumpur.
Venton Publishing Sdn Bhd.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 44
USING AUGMENTED REALITY FOR SUPPORTING LEARNING HUMAN
ANATOMY IN SCIENCE SUBJECT FOR MALAYSIAN PRIMARY SCHOOL
Huda Wahida Rosli, Fauziah Baharom, Harryizman Harun, Ali Yusny Daud,
Haslina Mohd, Norida Muhd. Darus
Universiti Utara Malaysia
Sintok, Kedah, Malaysia
hudawahida@yahoo.com
Abstract
This study proposes a conceptual model for exploring the prospect of a new form of Virtual
Reality (VR) application called Augmented Reality (AR) technology in education domain.
AR sets itself apart from VR by allowing integration of 3D virtual objects into real
environment in real time thus allowing student to relate with their physical environment and
also making the subject more interesting. It is hoped that by implementing AR in Science
learning helps to counter the declining interest in Science subject in Malaysian public schools
particularly in suburb area. AR able to help reduce the complexity of subject thus captures the
interest of student in learning science which the difficulty has become a norm for a long time.
This article is a concept article based on portions of literature review cum preliminary study
from a research that is still ongoing. The benefit of this project is for teachers and students
alike. It provides the teachers teaching aids and transforms the learning session to be more
interactive, attractive, and effective. As for the students, it assists in building their creative
thinking, improving their comprehension, and changing the paradigm of science learning
curve. It is highly hoped that the article would enlighten teachers in utilizing AR towards
dissemination of sciences knowledge and information.
Keywords: Augmented Reality, human anatomy, Science subject, education
1. INTRODUCTION
Science plays an important role in our life. It is a core subject in the curriculum for students
in preschool, primary (Malaysian of Education (MOE), 2009a) and secondary school (MOE,
2009b). The content of science for Year One in primary school focuses on human body,
animals, plants, senses, float and sinks, and also light and dark as basic areas of science itself
(Wan Zaharah & Missiah, 2003). As a point of discussion, this paper focuses on the human
body topic. It cant be stressed enough that science learning is important hence the
introduction of AR helps students to nurture their creative thinking, improve their
comprehension, and change the paradigm of science learning curve. Augmented Reality (AR)
evolved from Virtual Reality (VR) (Azuma, 1997; Kaufmann, 2003, 2005; Lyu, King, Wong,
Yau & Chan, 2005; Basogain, Izakar & Borro, 2007; Pribeanu, Vilkonis & Iordache, 2007)
approaches thus allowing computer animation goes one step further and open up to new
applications in many different fields (Tucker, 2004). AR differs from VR where it requires
real time marker for it to function (HITLabNZ, 2002). It allows merging of virtual
information with the real environment to provide user with more immersive interaction with
their surroundings (Hainich, 2006).
Education sector gains benefits from AR where it helps to create new exciting approach of
delivering teaching content (Billinghurst, 2002). This paper presents the AR technology as an
innovative tool for the educational environment. This paper starts with the definition and a
little bit history of AR and also comparison between AR and virtual reality (VR). Following
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 45
is how AR has been used in education, human anatomy in Science Subject and a few of
application of AR in education area. Lastly, the article discusses contributions of AR in a
classroom.
2. AUGMENTED REALITY
Ivan Sutherland is considered as the pioneer of AR field since he first developed the display
advancement in virtual area device, the Head Mounted Display (HMD). Researchers or
whoever interested in this area noticed that it is the beginning of the innovative technology of
AR (Azuma, Baillot, Behringer, Feiner, Julier, & MacIntyre, 2001). In the last few years,
technological advancement in computer processing power as well as in computer vision
research has helped to improve the study of AR (Behringer, 1999). The technology is still in
early stage however, the potential of AR technologies will grow rapidly and it can be applied
in so many fields not only in engineering (Kumaran, Santhi & Anand, 2007), medical
(Sielhorst, Obst, Burgkart, Riener & Navab, 2004), and construction (Webster, Feiner,
MacIntyre, Massie, & Krueger, 1996) but also in education (Billinghurt, 2002). According to
a definition provided by Milgram, Takemura, Utsumi & Kishino (1994), AR is a sub category
of mixed reality (MR) area based on real-to-virtual continuum, shown in Figure 1. MR
environment is a single display while two environments consists real environment and virtual
object environment presented together at the time (Milgram et al., 1994). Virtual Reality
(VE) added the virtual object into one space the surrounding known as Augmented Virtuality
(AV). While, Real Environment (RE) added the virtual object into the surrounding
environment knows as AR (Azuma et al., 2001). This study focuses on AR and next section
discusses more about the differences between AR and VR.
Figure 1: MFilgrams Reality-Virtuality Continuum (Milgram, 1994)
3. AUGMENTED REALITY (AR) VS VIRTUAL REALITY (VR)
AR and VR are significantly different from several aspects. The details of the differences are
as explained in Table 1 (Mohd Nihra & Norazlina, 2007; Kaufmann, 2003, Costello, 1997).
Table 1: Comparison between AR and VR
Differences AR VR
Environment Combined both real and virtual
objects coexist in the same
space and in real-time at real
environment
VR is requires totally
immersive in the virtual world
environment that a replaces the
real world.
User View Allows user to see the real
world around him and the
virtual object
User see the virtual
environment only
Need Space/Room No Yes
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 46
Health Issues AR solved the motion
sickness problem through
superimposed virtual image in
real environment through
special marker where human
brain can still process and
accept such idea
Known as motion sickness
where human brain unable to
differentiate between virtual
and reality and cause nausea
and heavy headache.
Safety Users feel comfortable and
able to control the
environment.
User feel unsafe because their
view blocked by the virtual
environment
Sense of immersion None Low Medium high
Based on the explanation of the differences between AR and VR above, it can be
hypothesized that AR is more suitable to be implemented in education because AR does not
distract the students from the real world hence; they are able to utilize the technology and at
the same time receive instructions from teachers. Moreover, it is much safer compared to VR
to be used as tool in teaching and learning since AR solved the motion sickness issue raised
by VR.
4. AUGMENTED REALITY IN EDUCATION
Rooting from the comparison between augmented reality (AR) and virtual reality (VR) in the
previous section, clearly AR is the more suitable to be implemented in a classroom and
dwelling on this notion, this study is conducted. Selecting science education as the focus, AR
is able to stimulate new type of interactivity with virtual world for the student in Year One
thus is able to assist in their mental development. This area should focused to change the
traditional method material have been transform with the new material or tools to improve the
efficiency teaching method based (Jensen, 2002; Basogain et al., 2007; Balog, Pribeanu &
Iordache, 2007) and AR can provide new experience to them. AR technology is suitable to
applied in this area (Billinghurst, 2002) where this technology a valuable and interactive tool
in academic process. According Billinghurst (2002), the educational experience in AR is the
ability to support the smooth transition between two environment which is reality and
virtually.
Utilizing AR in education will nurture creative thinking among students and enhance their
understanding in Science subject. AR provides exciting tools for the students to learn and
explore new things in more interesting ways. Having said that, Science subject will be more
significant to the young students because every finding is the fruit of their own exploration.
Other than that, it is also act as a paradigm shift to the students to see the Science subject as
something interesting and enjoyable to learn.
5. PRELIMINARY STUDY
In an effort to strengthen the fact of AR contributions in education, interviews had been
conducted at five primary schools in Jitra, Kedah vicinity. It is found that the five teacher as
the expert respondents who have been teaching the Science subject for more than five years
gave good responds to the implementation of AR in the proposed topic which is human body.
The teachers can make some preparation before classes using the latest and new method
besides adding the learning aids. It also helps the teachers to enhance the reading materials
and encourage the teachers to always be ready with other knowledge. In addition, the often
main problem faced by the teachers during the teaching and learning session using the
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 47
learning aids, the CDs as an intermediary teaching module is the students easily lose focus in
a learning session. This becomes a barrier to teachers to use the CDs as a learning aid because
it is not able to attract students. Therefore, AR technology is built as a solution for the
problems.
Technology that uses this approach is appropriate to implement the Year One students
because at this age, their curiosity is higher in line with their imagination level. Apart from
that, this technology can help to build their creative thinking, improve their understanding
and feel that science generally, and human anatomy specifically is the interesting subject to
be learned.
According to the respondents, students basically will be taught on how to pronounce and
what are the parts and the functions of body parts are and how to take care of them. The
following are the common learning aids used by respondents such as singing, drawing, chart
diagram, word card, puzzle, exercises, worksheet, following the respondent movement, and
CDs. This study is conducted to proof that AR is fit as an addition to the long list of learning
aids which can greatly assist teachers in diversifying their learning tools and it will make the
learning session more attractive and effective.
Table 2: Interview result
Problems in Science subject Percentage in Science subjects decreased in several schools
in the UPSR examination is caused by three main factors:
i. Preparation of teachers in classes: when teachers are
not prepared the learning aids (BBM) and Teaching
and Learning (P&P), this is a reason that students
feel less interested in the delivery of these teachers
and this will impact directly to the subjects taught
ii. Exposure of teachers with UPSR examination
papers: The teachers who are experienced in
marking examination papers having different
teaching methods than teachers with less or no
direct experience in the field and this causes give
the impact for the standard marks.
iii. Teachers experience in teaching Science subject:
The main problem in the Primary Schools is those
teachers who teach the Science subject majority is
non-Science subject option.
Problems using technology as
learning aids in Science
Subject
i. Students easily lose focus of the session learning to
use the CDs as a medium of teaching modules
ii. CDs supplied damaged
iii. Computer that is often problematic and often
damaged
Advantages using technology
as learning aids in Science
subject
i. Teaching and learning more attractive and more
efficient
ii. Teachers who use the technology as learning aids, it
is more confident and able to describe a thing more
clearly
Implementation of Augmented
Reality (AR) Technology in
i. Students more interested and able to development
their minds of human internal organs that are not
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 48
Science Subject focuses on
human body
available in textbooks
ii. Teachers can add learning aids and can also make
preparations to class with new technology.
Table 2 shows the analysis obtained from interview. Based on interviews carried out, the
study found that the respondent still unaware and unfamiliar with the existence of AR
technology. The concept of education in this level is to introduce the fundamental topic as
early exposure to students. According to the respondents, students in Year One have learned
with fast because of their high level of attention and their easy learning attitude. This is
advantages to them because it is early exposures to cover the fundamental aspects and
encouraging the creative and critical thinking skills in order to assist their mental
development.
Human anatomy topic is too common that covers the external body and the students only
learn the basic function of the body. Therefore, this study aims to improve the existing
knowledge by adding the basic knowledge of the internal organs and the students also learn
the basic functions of the organs. This study only reflects a small portion of contributions of
AR in a classroom.
6. EXAMPLES OF AUGMENTED REALITY IN A CLASSROOM
The academic area also affected by these technologies and could be implemented in many
area of education such as medical (Sielhorst et al., 2004), geometry and mathematic
(Kaufmann & Papp, 2006), archeology (Balaguer, Lors, Junyent & Ferr, 2001), symbol
language (Wagner & Barakonyi, 2003) and other disciplines will be applied the technology.
From the literature, this section will highlight the sub of education area that has been applied
AR technologies such as astronomy, biology and storytelling.
Shelton and Hedley (2002) has developed virtual sun and earth through AR to teach students
astronomy. The model has the ability to view from any of the students view and position.
They found out from their study, the students received a significant understanding through
the projected image of AR they concluded that by allowing the students to manipulate the 3D
objects, however there is little misunderstanding in grasping the subject. The usage of visual
and sensory information creates a powerful learning experience for the students. Shelton
(2002) also hypothesize that 2D diagrams shown for learning and education creates a
cognitive filter and is researching further to understand the learning content based on AR
interaction using the direct cognitive path.
In biology area, Juan et al. (2008) produced the learning system on interior human body.
These systems able for students operate which part their needed to explore the human organ
on detailed. In addition, this system allows students to choice female or man body. In
generally, the objective developing this system is too determined whether visualization gives
the influences perceptions to students. At the end of this study, students consider using this
system for learning and enhanced their understanding about the human body.
This technology is currently suitable to implement in storytelling. Billinghurst et al. (2001)
developed The MagicBook application. This book replaced the traditional method of book. It
seems the fantasy since students can see the 3D animation virtual model appearing on the
current pages using the AR display. They can see the pop-up avatar characters from any
perspective view. It liked students immerse in the environment both real and virtual knows as
mixed reality.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 49
There are several examples that using AR in classroom for learning process. However, there
are so many studies conducted to prove that AR practicable to implement in classroom and
the result of those studies shown this technology help to improve the learning process. There
are abundant of benefits that AR could carry into the classroom and next section would focus
on this.
7. BENEFIT OF AUGMENTED REALITY IN A CLASSROOM
According to Billinghurst (2002), the reasons to implement AR in education domain includes
its support of seamless interaction, use tangible interface metaphor and transitional interface.
The seamless interaction means students can be seated in a group viewing the same display
on the same space combining the virtual object and real environment at the same time.
Meanwhile, tangible interface metaphor manipulates the virtual objects using the HMD or
Interaction system could be using keyboard. Moreover, the ability to transit smoothly
between the real and virtual environment allows the students to experience both worlds
activity simultaneously.
Several advantages to integrated AR technology in education are to improve the skill of
teaching when teacher become a creative to manipulate the learning tools. Other, science
experiences also influent to enhance the students to construct their intellect, thinking skill
(Martin, Sexton, Franklin, Gerlovich, & McElroy, 2009) and make them more confident to
manipulate the machine.
Many researchers (Cooperstock, 2001; Billinghurst, 2002; Kondo, 2006; Kaufmann & Papp,
2006; Balog et al., 2007; Basogain et. al, 2007; Juan, Beatrice, & Cano, 2008) supported that
have many benefits implement AR technologies in academic especially to improve and
empower the tool for education and make learning more attractive and fun for students
learning environment (Bruce, 1997; Martin et al., 2009). According to Kaufmann (2003) and
Martin et al. (2009), the assistive technologies cannot guarantee academic success but it
provides to students the alternative ways to ease understand the subject using innovative tool
technology.
8. CONCLUSION
These paper presented concept idea of AR technologies. There are many more benefits that
can be utilized with this AR technology in education area. Highly hope, with the few selected
benefits has been discussed in this article that can be motivated to educators to implement
these technologies in classroom for the future as learning aids.
REFERENCES
Azuma, R. (1997). A Survey of Augmented Reality. PRESENCE: Teleoperators and Virtual
Environment, Vol. 6, pp. 355-385.
Azuma, R., Baillot, Y., Behringer, R., Feiner, S., Julier, S., & MacIntyre, B. (2001). Recent
Advances in Augmented Reality. IEEE Computer Graphics and Applications, 21(6), 34-47.
Balaguer, A., Lors, J., Junyent, E., & Ferr, G. (2001). Scenario Based Design of
Augmented Reality Systems Applied to Cultural Heritage. Proceedings of the PH-CHI.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 50
Balog, A., Pribeanu, C., & Iordache, D. (2007). Augmented Reality in Schools: Preliminary
Evaluation Results from a Summer School. International Journal of Social Sciences, 2, 3.
Basogain, X., Izakar, J.L., & Borro, D. (2007). Educational Mobile Environment with
Augmented Reality Technology. INTED 2007 Proceedings CD. ISBN, 84-611.
Behringer, R. (1999). Registration for Outdoor Augmented Reality Applications Using
Computer Vision Techniques and Hybrid Sensors. IEEE Virtual Reality Conference. Pp.244.
Billinghurst, M. (2002). Augmented Reality in Education. New Horizons for Learning, www.
newhorizons. org/strategies/technology/billinghurst. htm.
Billinghurst, M., Kato, H., & Poupyrev, I. (2001). The MagicBook-Moving Seamlessly
between Reality and Virtuality. IEEE Computer Graphics and Applications, 21(3), 6-8.
Bruce, T. (1997). Early Childhood Education (2nd ed). London: Hodder and Stoughton.
Cooperstock, J.R. (2001). Classroom of the Future: Enhancing Education through Augmented
Reality. HCI International, Conference on Human-Computer Interaction, New Orleans,
pp.688-692.
Costello, P. (1997). Health and Safety Issues Associated With Virtual Reality: A Review of
Current Literature. JISC Advisory Group on Computer Graphics, Technical Report No, 37.
Hainich, R. R. (2006). The End of Hardware: A Novel Approach to Augmented Reality (2nd
ed.). Booksurge. ISBN 1419652184
HITLabNZ. (2002). ARToolKit. Retrieved Mac 22, 2009, from ARToolKit Documentation:
http://www.hitl.washington.edu/artoolkit/documentation/userarwork.htm
Jensen. E. (2002). Teaching with the Brain in Mind. Chapter 1. Association for Supervision
and Curriculum Development Alexandria, VA.
Juan, C., Beatrice, F., & Cano, J. (2008). An Augmented Reality System for Learning the
Interior of the Human Body. Advanced Learning Technologies, 2008. ICALT '08. Eighth
IEEE International Conference (pp. 186-188). Santander, Cantabri: IEEE.
Kaufmann, M. H., & Papp, M. (2006). Learning Objects for Education with Augmented
Reality. Proceedings of EDEN, 160-165.
Kaufmann, M. H. (2005). Geometry Education with Augmented Reality. Unpublished
Dissertation at TU Vienna.
Kaufmann. M. H. (2003). Collaborative Augmented Reality in Education. Imagina
Conference.
Kondo, T. (2006). Augmented Learning Environment using Mixed Reality Technology. In T.
Reeves & S. Yamashita (Eds.), Proceedings of World Conference on E-Learning in
Corporate, Government, Healthcare, and Higher Education 2006 (pp. 83-87). Chesapeake,
VA: AACE
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 51
Kumaran, G.S., Santhi, K. R., & Anand, P.M.R. (2007). Impact of Augmented Reality (AR)
in Civil Engineering. Advanced Materials Research. Vol. 18 19.
Lyu, M. R., King, I., Wong, T. T., Yau, E., & Chan, P. W. (2005). ARCADE: Augmented
Reality Computing Arena For Digital Entertainment. IEEE Aerospace Conference. Pp. 1-5.
Malaysian of Education (MOE). (2009a). Primary Subjects. Retrieved Mac 22, 2009, from
Ministry of Education Malaysias Official Portal: http://www.moe.gov.my/?id=126&lang=en
Malaysian of Education (MOE). (2009b). Secondary Subjects. Retrieved Mac 22, 2009, from
Ministry of Education Malaysias Official Portal: http://www.moe.gov.my/?id=125&lang=en
Martin, R. E., Sexton, C., Franklin, T., Gerlovich, J., & McElroy, D. (2009). Teaching
Science for All Children: An Inquiry Approach. US:Pearson.
Milgram, P., Takemura, H., Utsumi, A., & Kishino, F. (1994). Augmented Reality: A Class
of Displays on the Reality-Virtuality Continuum. SPIE Vol. 2351, Telemanipulator and
Telepresence Technologies , 282-292.
Mohd Nihra Haruzuan Mohamad Said, Norazlina binti Ismail. (2007). Overview of Open
Source Augmented Reality Toolkit. 1st International Malaysian Educational Technology
Convention (IMETC).Pp: 1144-1149
Pribeanu, C., Vilkonis, R., & Iordache, D. D. (2007). A Task-Based Design Approach for
Augmented Reality Systems. Proceeding of World Academy of Science, Engineering and
Technology. (vol.25).
Shelton, B. (2002). Augmented Reality and Education: Current Projects and the Potential for
Classroom Learning. New Horizons for Learning 9(1).
Shelton, B., & Hedley, N. (2002). Using Augmented Reality for Teaching Earth-Sun
Relationships to Undergraduate Geography Students. Paper presented at the First IEEE
International Augmented Reality Toolkit Workshop. Darmstadt: Germany.
Sielhorst, T., Obst, T., Burgkart, R., Riener, R., & Navab, N. (2004). An Augmented Reality
Delivery Simulator for Medical Training. International Workshop on Augmented
Environments for Medical Imaging.
Tucker, A. B. (2004, April 27). Computer Science Handbook (second ed.): Chapman &
Hall/CRC. Retrieved from
http://books.google.com.my/books?id=9IFMCsQJyscC&q=Virtual+reality
Wagner, D., & Barakonyi, I. (2003). Augmented Reality Kanji Learning. Proceedings of the
Second IEEE/ACM International Symposium on Mixed and Augmented Reality (ISMAR
'03) (pp. 335-336). IEEE.
Wan Zaharah Megat Hashim & Missiah Haji Sanusi. (2003). Science Textbook Year 1.
Integrated Curriculum for Primary School. Fergoes: Kuala Lumpur.
Webster, A., Feiner, S., MacIntyre, B., Massie, W., & Krueger, T. (1996). Augmented
Reality in Architectural Construction, Inspection and Renovation. Proc. ASCE Third
Congress on Computing in Civil Engineering. Pg. 913-919.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 52
COLLABORATIVE NETWORK SECURITY MONITORING (NSM) ANALYSIS
FOR NETWORK FORENSICS INVESTIGATION
Ali Fahmi Perwira Negara
1
, Asrul Hadi Yaacob
2
, Mohd Fikri Azli Abdullah
3
1,2
Faculty of Information, Science, and Technology (FIST)
Multimedia University (MMU) Malaysia
Jalan Ayer Keroh Lama Melaka 75450 Malaysia
1
ali.fahmi.pn@gmail.com
2
asrulhadi.yaacob@mmu.edu.my
3
School of Electronics and Computer Engineering
Chonnam National University, South Korea
3
mfikriazli@gmail.com
Abstract
Easy information exchange supported by recent networking technology exposes a security
issue. To determine and then to recover from a computer-related incident, theres necessity to
have a measure and to determine responsive steps like a possibility of legal proceedings in
which requires a special skill in a field known as digital forensics. Its sub discipline, network
forensics, in particular has increasingly been popular due to the fact that most incidents occur
through a network. Network forensics still encounters some problems due to its nature as a
joint field of study comprising from computing knowledge to law area. As a joint field of
many areas of expertise, network forensics shares same problems encountered in the field of
digital forensics. Complexity of the process and massive quantity of data being analyzed are
two major problems. There exists an advanced network monitoring technique called Network
Security Monitoring (NSM) that comprehensively dealing with data travels across network as
a method on network forensics investigations. Based on NSM, this research addresses those
problems on network forensics. NSM provides a platform to help structured evidence
collection and further analysis in a complex network forensics investigation. The existences
of collaborative tools in this research are used by investigators to simplify joint network
forensics investigation enabling various people from different backgrounds to work together.
Keyword: Network Security Monitoring (NSM), collaborative tool, network forensics
1. INTRODUCTION
Network forensics are performed by making use network monitoring techniques in which
they commonly involve only few types of data like log and alert data investigation. However,
there exists advanced network monitoring technique that more comprehensively dealing with
data travels across network. The technique is called Network Security Monitoring (NSM).
NSM provides a platform to help structured evidence collection and further analysis in a
complex network forensics investigation. The paper will show how NSM is used in
investigation and how one existing tool and another one newly introduced prototype tool are
used in a collaborative network forensics investigation.
The rest of paper is structured in 5 sections. Section 2 describes about related works. Section
3 demonstrates on using NSM in network forensics investigation. Section 4 explains the
details of design system and its implementation. Section 5 concludes the paper with a brief
summary.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 53
2. RELATED WORKS
CS Lee and Meling Mudin (2009) explains network forensics as a process involving the
collection of network packets from wired or wireless networks, analyzing, recovering the
information from the packets and reporting them in presentable and forensically sound
manner. Tons of data from networks can only become useful information and evidence only
if investigators understand on how to correlate Network-Based Evidences (NBEs) so that
they able to reduce NBEs only to a useful remainder. Only by then, this useful remainder is
subsequently analyzed further. Wei Wang and Thomas E. Daniels (2005) respond the
challenges of network forensics as stated by Brian Carrier (2005) about complexity in
investigation process and massive data involved in it. Wang and Daniels explain the demands
of network forensics analysis technology. In their arguments, they emphasize about friendly
interface to help investigators producing evidence like intrusion evidence and also argue
about analysis results should be presented in an intuitive approach. The ad-hoc nature of
cyber attacks indicates that expert opinion and out-of-band information must be efficiently
integrated into the human reasoning intuitively especially to the non-technical investigators.
3. NETWORK SECURITY MONITORING (NSM)
3.1 NSM in Network Forensics Investigation
It is often realized in during network forensics investigation that data collected is neither
sufficient nor presentable to analyze and even to use it as evidence of an incident. This
mostly happens due to either lack of data collected or less comprehensive data collected.
Common network monitoring technique involving only analysis of few types log-based data
usually encounters those obstacles.
Considering those, NSM is introduced to fill the void. Bejtlich and Vischer (2005) define
Network Security Monitoring (NSM) as The collection, analysis, and escalation of
indications and warnings to detect and respond to intrusions.(p.25). NSM allows
investigators to collect, identify, examine, correlate, analyze all traffic that may and may be
not related to the incident. NSM is different from a merely an intrusion detection often used
in common network monitoring. In NSM, it more comprehensively focuses towards the
whole packet and traffic that may cause an alert in intrusion, be it a traffic that preceding the
primary event causing alert, traffic during incidents/events, or a traffic after the main event.
Through NSM, investigators may be able to see a clearer picture of an incident compared to
common network monitoring. They do not depending on solely alert generation which is not
a reliable way to perform network forensics. Alert is just simply an early alarm by which it
may or may not lead to a legitimate event. It may give a false alarm (either positive or
negative) which can be confusing in investigation. NSM gives a full picture of data and
traffic from the event generating alert so that analyst and investigator won't be misled.
Another difference with common network monitoring is in terms of data types to collect.
NSM performs standard data collection encompassing 4 data forms: statistical data, session
data, full content data, and alert data. By collecting them, NSM gives full clues and leads
neutrally to investigators that may be necessary for forensics investigation, reducing chance
of false negative or positive data. This principle is in conjunction of basic investigation
principle: Assume nothing over a crime scene.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 54
3.2 NSM Analysis: From Raw Data to Presentable Evidence
Common network monitoring is often only up to data acquisition and analysis for one selfs
purpose while network forensics investigation, the process is longer, starting from
preparation to a presentation of evidence. Therefore, network forensics is not only things
about capturing data and analysis only. There are at least 2 main phases in investigation, one
(1) is the data acquisition (which most of the time investigators deal with raw, uninterpreted
data) and its analysis (pre-analysis) and the other one is (2) another analysis process of
producing presentable evidence (post-analysis). The earlier phases will mostly be concerned
by investigators possessing technical backgrounds in computing technology while the latter is
much of concerned to investigators related to legal matters.
According to the phases above, there is often a difficulty that occurs in 2 type of situation
when (1) an investigation is taking place during analysis of raw data and (2) in transition
from passing a data from pre-analysis consisting full technical information to convert it to
presentable evidence during post-analysis. The difficulty most of the time occur as the
investigators dont have a proper tool to communicate and to collaborate the data among
themselves, especially between technical investigators (IT experts) and non-technical ones
(policemen, prosecutors, etc.). Larry E. Daniel (2010) has expressed his experience regarding
the 2
nd
situation in his article Attorneys are from Mars, Computer Forensics People are from
Pluto mentioning that it indeed exists a communicating barrier among the kind of
investigators like attorneys and the computer-types investigators like him when
communicating findings or delivering presentable data to non technical investigators.
3. NETWORK FORENSICS WITH NSM METHODOLOGY
As a sub discipline of digital forensics, network forensics using NSM shares same
methodology to conduct an investigation. The methodology consists of three (3) main steps
which are (A) identification, (B) preservation, and (C) reporting/presentation. In details,
preservation process can be further elaborated into two (2) sub-processes which are data
collection/acquisition and analysis of data.
Figure 1: Standard digital forensics investigation method
(Courtesy of Cyber Security Malaysia)
The first step is the identification process to determine a starting point on investigation. This
step is to decide from which position to start the investigation. Upon completion of
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 55
identification, they go to the most critical step that is preservation process. It will be the 2
nd
step as it will deal directly to data and to process on how data is collected and subsequently
then analyzed to extract useful information towards the aim of investigation. This is the
trickiest part as investigators are exposed to risk of either collecting evidence that contains
insufficient to analyze it or collecting evidence but not presentable to analyze, or worst is
unable to collect the data. The last step to be accomplished is about how the information is
reported and presented from analyzed data properly.
4. DESIGN AND IMPLEMENTATION
4.1 System Architecture Design on Local Area Network (LAN)
Figure 2: System architecture of NSM in a LAN for forensics purpose
The system architecture of NSM mainly consists of 3 components as the essential building
block of any NSM systems which are the sensor, the server, and the client. The sensor is
basically a device where all tools for data acquisition and collection are deployed into. The
sensor can be either connected to dedicated network tappers and run in promiscuous mode to
avoid traffic generation from itself or it can be installed in the gateway where all inbound and
outbound traffic over a network pass it by. The server is the element that functions like the
brain and heart of the system as it controls and serves the flows of data and request flowing
from sensor to server, client to server, server to sensor, and server to sensor. Moreover, it also
controls on how data is being stored and archived in the database of evidence collection. The
last element, the client, is basically an interface for analysts to retrieve and analyze data from
the server. In the sensor, besides tools for capturing purposes, it is installed a web server and
a web-based collaborative tool for post-analysis of forensics investigation. In client side, a
client application is installed to provide a collaborative tool among analysts investigating
raw.
4.2 Collaborative Tools on NSM-based System for Network Forensics
The collaborative tools which enable collaborative NSM analysis in this research are
basically divided into two categories: 1
st
situation of raw data investigation and 2
nd
situation
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 56
on transitional analysis for proper evidence presentation. The tools are Sguil (pronounce as
sgweel) and PacketMonzeight. The role of each collaborative tool differs from the part they
contribute in investigation. This research shows how the tools take their part on investigation
based on an investigation later. The role of each tool is briefly described according the
categories as following:
4.2.1 Collaborative Tool for Pre-Analysis (Raw Data Analysis)
Raw data analysis often mentioned as a nightmare in investigation process as it involves very
large and massive data about traffic across a network especially if the network investigated is
a high bandwidth and fast network. Coupled with the nature of investigation process that is
complex, existence of a tool in this process is highly regarded as very helpful during
investigation. Here, the main tool for collaborative analysis for low level and raw data used is
Sguil which enabling analysts to investigate together. The Sguil tool originally developed by
Bamm Vischer basically is the back bone of the NSM system implemented in this research.
4.2.2 Collaborative Tool for Post-Analysis (Evidence Presentation)
Upon completion of analysis of low level data format and extraction of useful information
done by technical investigators (analyst), the subsequent step is to communicate findings and
present evidence (NBE) in a proper way to present it in such a way that is easy to understand
for non-technical reader and accepted by legal proceeding. To achieve those, the
collaborative tool must appear in intuitive way, be able to keep track of investigation process
goals (investigation target and scheduling, etc), enable in such a way that the tool drives
collaborative effort such as discussion in findings, easy access to collection of evidence,
report, etc. in investigation for cross check analysis, file sharing, and so on. If the tool can be
made ubiquitous and easy to access while mobile, that will be another advantage. Therefore,
a web-based collaborative tool is the solution over those requirements above.
PacketMonzeight is then introduced in this paper and proposed to cater those requirements.
4.3 Implementation on Scenario-based Incident
The implementation of the tools is demonstrated through a scenario that simulates an
incident. This scenario incorporates demonstration of possible security incident in a fictive
entity. The scenario covers from attacking scenario, detection and identification scenario, and
recovering the NBE. The scenario is as following: A company named MICROSOLVE has
been targeted by an attacker who trying to get into the network to steal companys secret
information. This attacker will try to gain access by exploiting a hole to gain root shell or
admin privileges. Upon successful, the attacker will breach into secret file data storage and
get some confidential data in it. Lastly, the attacker will make use of FTP service in targeted
host to transmit the backdoor to access the compromised host next time. MICROSOLVE has
deployed NSM system into their network with router/firewall NAT-enabled which also acts
as a sensor. Variables here used are 192.168.1.100 for attacker and 192.168.1.101 for the
gateway/sensor of MICROSOLVE network. The testing scenario are done inside a LAN
where sensor and attacker at the same LAN and the other LAN resembles MICROSOLVE is
NATed by the sensor/gateway/firewall in 192.168.2.0/24 network.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 57
4.3.1 Attack Phase
The attack phase will consist of reconnaissance phase, exploit phase, and reinforcement-
consolidation-pillage phase. The reconnaissance phase uses techniques such as port scanning
to determine services running on targeted host that can be a hole to exploit later on. In this
research port 21, 22, 53, 80, and 9080 are purposely opened. Then, the exploit phase will take
place upon completion of reconnaissance or information gathering. Here, the exploit is
launched to port 9080 using a module of Metasploit Framework (MSF) v3.3 called
Snortbopre (exploit to back orifice stack overflow of unpatched Snort v2.4.x to port 9080)
that resulting a shell root gained.
Figure 3: Exploitation to vulnerable port 9080 resulting root shell access
Upon successful exploitation, the attacker then successfully gain access to the system and
start doing reinforcement and consolidation by transmitting and installing a backdoor file for
future access. Then, attacker will do the pillage phase which is to steal the desired file he/she
wants to steal.
4.3.2 Detection and Identification to Respond: Sguil in Action
In MICROSOLVE side, the NSM system notifies to the investigators that theres a possible
breach attempt or even breach event. Alert data has been generated by the sensor to warn the
investigators that theres event been taking place in the network. The warnings are:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 58
Figure 4: Alerts generated as a result of incident
From the warnings, the investigators now can detect and recognize what is likely the attack
is. To verify and examine the event, the investigators must also look to other data rather than
just warnings. This can be done using Sguil. Furthermore, when investigators are using Sguil
together, they can communicate through their running Sguil connecting to the same host
when doing real time analysis together at the same time. This is the deeper look of warnings
in Sguil:
Figure 5: Sguil simplifies investigation with its friendly UI and discussion features
The output of NSM over the incident is displayed in simple interface in Sguil. In Sguil, it can
be seen the TCP stream session flow data (timestamp, communicating parties IP and Port
No.), the alert data (spp_boo: Back Orifice Snort Attack exploit, etc.), Statistical Data (in low
left corner panel; packet stat, bandwidth consumed, alert generation rate, etc.) and also full
content data at the low right corner displaying the actual content and payload along with the
disassembled protocol data to make analysis easier. From here, the analysts/investigators
have gained critical and valuable insights to determine the more similar process through other
tools to verify the data obtained and also to extract other type of information in which Sguil
cant adequately provide in its interface. As an example, using Wireshark to examine the
pcap packets captured across network using NSM technique. Later in the evidence recovery,
it will be shown on how to verify the NBE found and to see the information.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 59
4.3.3 Evidence Recovery Process
Another excellent factor implementing NSM is easy to recover the evidence needed to prove
such an incident truly happened. Through NSM, during setting up the sensor, a NSM sensor
is configured to have the suspicious packet related to alert to be reduplicated separately from
other packet in a form of libpcap-based file. Among all packets captured in the regular
directory, it is possible that there are a lot of other files that can be the NBE for an incident.
However, the massive size of them makes it not feasible to check the whole packet per
individual packet basis. By configuring sensor to do reduplication specific packet that
generates alert into separate directory/partition, the investigators have a more focused object
to be examined. If later other packets related to the specific packet deemed necessary to be
inspected also, then at least investigators have a clear starting point to inspect a packet rather
than a random checking one. The evidence that can be recovered from the incident scenario is
shown as following:
Figure 6: The information obtained from NSM in the incident
The NBE above shows some useful information about the chronology on how the attack was
carried out resulting in incident. The evidence above shows 3 types of events prior to the
breach to the 192.168.2.0/24. They are done by exploiting and attacking the
gateway/firewall/router/sensor in 192.168.1.101 (which NATed the 192.168.2.0/24 network).
Above information displays three (3) types of attack to the sensor: (a) aggressive port
scanning to reveal vulnerable hole displayed in red colored TCP/IP stream, (b) FTP session in
(light violet colored) to the 192.168.1.101 to transmit malicious backdoor and also stealing
information from MICROSOLVE, and (c) the exploit attacks using Snortbopre exploit to port
9080 (in W32 system known as glrpc port) to gain root shell/admin privilege. The attacker
address is also able to be recorded to trace it later on or to explain source of incident during
law enforcement hearing/investigation session.
4.3.4 Communicating to the Less Technical Investigators
Identification to determine the starting point to acquisition and raw data analysis is done.
Technical investigators have agreed on conclusion upon data analysis and interpretation on
the look of incident. Simply said, the pre-analysis is done to post-analysis turn. Now its the
time to make the information obtained useful for further process especially the legal
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 60
proceedings. The legal proceeding requires well organized investigation process, concise,
trusted, and accurate evidence.
To present NBE and show how investigator is conducted in well archived and concise
manner, PacketMonzeight will be used. This software is designed to facilitate the
investigation communication and provide tracking to progress and schedule as well as
graphical information and information findings. Therefore, the software will provide few
functions to help the investigation. For example, a schedule tracker in a form of calendar is
provided to see schedules, plans, and deadlines on investigation. Besides, it also provides a
bulletin board where all analysts can exchange information, ask and reply to
issue/topic/question, and to announce important information. Those investigation assisting
tools against the incident scenario are shown below:
Figure 7: PacketMonzeight provides schedule tracking for investigation
Figure 7 depicts the tool functions in overview section as a tracker of agenda, plan, and
schedule for the general purpose of legal proceeding process. The tracker is implemented in a
form of calendar which serves as the notes of the schedule on a particular date lead
investigator can set. By this, the workflow of investigation can be done in well organized
manner. Besides, it serves as general reminder for all investigators. As an addition, theres a
bulletin board provided to keep track all valuable information must be known by all
investigators. In graphs section, the factual information over incident like the top ten
attacking IP and the number of malicious packet attempting to compromise the system can be
displayed in intuitive manner together with the ability to create a report of them. This will
give the understanding upon evaluation of event taking place to the system. Figure below
shows how the graph can help a team of investigators especially those less technical to grasp
factual information about the network/system:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 61
Figure 8: Graphically presented data gives intuitive understanding
In collaborative section, the tool as depicted in Figure 9 and 10 below serves as the repository
of all evidences found either to be or been analyzed, report, and analysis collection accessible
in intuitive manner.
Figure 9: PacketMonzeight provides discussion board and file exchange for investigation
Figure 10: PacketMonzeight provides repository tool for investigation
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 62
5. FUTURE WORK AND CONCLUSION
The NSM technique for network forensics investigation provides promising answer over the
needs and challenges in a complex network forensics investigation with massive data
collection. The existence of collaborative tools in NSM analysis comprising pre-analysis tool
and post analysis tool will help a team of investigators to easily set the workflow of
investigation in organized manner and to work easier dealing with low level raw data. Using
this approach in network forensics investigation, a well organized, concise, and clear
investigation to presentation process will make legal proceedings benefit over the framework
proposed in this research. Future work will be made for improvement in aspects of further
development of prototype proposed in the post-analysis collaborative tool and developing
intermediate application between those two types of collaborative tools.
ACKNOWLEDGEMENT
I sincerely express my utmost heartfelt appreciation and thanks to NSM worldwide
community (Bejtlich, Vischer, Bianco, Edward F., Meling Mudin and CS Lee), my
supervisors (Mr. Asrul Hadi Yaacob and Mr. Mohd Fikri Azli), and my cliques in Linux SIG
MMU Melaka (Adnan Mohd Shukor, Leong Jaan Yeh, and Hafez Kamal).
REFERENCES
Bejtlich, R. (2005). The Tao of Network Security Monitoring. Boston: Addison-Wesley.
Carrier, Brian. (2003). Defining Digital Forensic Examination and Analysis Tools Using
Abstraction Layers. International Journal of Digital Evidence Vol 1, 4
Casey, Eoghan. (2003). Network Traffics as A Source of Evidence : Tool Strengths,
Weaknesses, and Future Needs .Digital Investigation (2004) I (p.28-43). Retrieved
from : http://www.elsevier.com/locate/diin
Digital Forensic Research Workshop. (2001). A Research Road Map to Digital Forensics.
Utica, NY : DFRW
E. Daniel, Larry. (2010, March 2010). Attorneys are from Mars, Computer Forensics People
are from Pluto. Retrieved from: http://exforensis.blogspot.com/2010/03/attorneys-are-from-
mars- computer.html
Garfinkel, Simson. (2002, April 26). Network Forensics: Tapping the Internet.
Retrieved from: http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.html
[2009, November 27]
Halliday, Paul. (2007, April 3). Squert-0.4.0 Has been released (Snort User).
Retrieved from e-mail: hr@neohapsis.com [2009, November 17].
Jones, K. J., Bejtlich, R., & Rose, C. W. (2006). Real Digital Forensics: Computer Security
and Incident Response. Upper Saddle River, NJ: Addison-Wesley.
Kanellis, Panagiotis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos.
(2006). Digital Crime and Forensics Science. London: Idea Group
Laurie, Ben.(2004, June) Network Forensics. Queue: Portal ACM Volume 2,Issue 4 50 56
[2009, November 18]
Mandia, Kevin and Chris Prosise. (2001). Incident Response: Investigating Computer
Crimes. California: McGraw-Hill
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 63
Merkle, Laurence. D. (2008). Automated Network Forensics. Proceedings of the 2008
GECCO Conference : Companion on Genetic and Evolutionary Computation 1929-
1932.
Mohay, George et. al. (2003). Computer and Intrusion Forensics. Massachusetts: Artech
House Inc.
Mudin, Meling and C.S Lee. (2009, October). Network Forensics for Dummies. Paper
presented at conference of HiTB SecConf 2009 Kuala Lumpur, Malaysia.
Wang, W., & Daniels, T. E. (2005). Building Evidence Graphs for Network Forensics
Analysis. Proceedings of the 21st Annual Computer Security Applications Conference
(ACSAC 2005). IEEE Computer Society.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 64
THE EFFECTS OF EDUTAINMENT TOWARDS STUDENTS ACHIEVEMENTS
Harnani Mat Zin & Nor Zuhaidah Mohd Zain
Faculty of Information & Communication Technology,
Universiti Pendidikan Sultan Idris
harnani@upsi.edu.my, norzu@ftmk.upsi.edu.my
ABSTRACT
The purpose of this study is to examine the effect of edutainment (games) in classroom
towards students achievements. Edutainment can be defined as a combination of education
and entertainment, which is implemented via software and delivered by a cable network or
the Internet. A total of 60 students from two different standards three classes have involved in
this study. They shared the same level of knowledge and ability. The respondents have been
divided into two different groups, which are control group and experiment group. Each group
consists of 30 students. Both groups had given a set of pre-test. Then, the edutainment
software was used to support the teaching and learning process in experiment group. While
the control group was teach using conventional method without using any edutainment
software. In this study, we used the Edutainment software provided by the Ministry Of
Education for Information and Communication Technology Literacy (ICTL) Year 2 subjects
and with title Rays Letters and Numbers. After that, the respondents from both groups were
given post-test and a set of questionnaire. The collected data were analyzed using SPSS 12.0.
Results shows, 83.8% of students agreed that the use of Edutainment software will increase
students understanding toward the topic has been taught, 96.6% of students show their
interest in using Edutainment software in teaching and learning process, and 94.3% of
students agreed that Edutainment software was suitable to be used in the classroom as one of
the important teaching aids.
Keyword: Edutainment, Edutainment software, students achievement, teaching aids.
1. Introduction
In recent years, electronic games, home computers, and the Internet have assumed an
important place in the life of children and adolescents. New media are causing major changes
in the nature of learning. There is a vast gap between the way people learn and the way in
which new generations approach information and knowledge. Nonetheless, in the formal
educational setting the new media are still under-represented.
Play is a very serious matter. It is an expression of our creativity; and creativity is at
the very root of our ability to learn, to cope, and to become whatever we may be
Rogers & Sharapan (1994) cited in Sharon DeVary (2008).
Referring to the statement given by Rogers & Sharapan (1994) (cited in Sharon DeVary
(2008)), playing is the nature of the children and they learn while playing. Young children
cannot grasp the complexities of formal education. However, at an early age, they begin to
learn through play. This play begins to build the foundation of knowledge that is eventually
used for more advanced learning. The introduction and ever-increasing use of computer
games has prompted educators to debate and research the merits for using computer games as
learning tools.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 65
The notion that education and learning can be linked with lucid, playful and pleasurable
experiences is not new. The introduction of computers and the Internet has affected this
tradition for the past half century. For at least the past twenty years, concepts such as
edutainment and technotainment have been radically transforming the relationship between
learning and play.
Digital games have been around for over 25 years (Bryce & Rutter, 2003) so today's college
students grew up playing digital games as part of their culture. The amount of time children
spend playing digital games varies with age and gender. Like it or not, the games have
changed the way current students learn. Unfortunately, some teachers are often reluctant to
change the way they teach or to incorporate games into their pedagogy.
Childrens edutainment has become immensely popular and commercially successful with
parents, teachers and children. In the past, however, teachers and parents did not see the
importance of edutainment. They did not see how childrens everyday play experiences could
be a tool for learning. Educational researchers and psychologists have written extensively
about the benefits of play as an integral part of childrens learning.
2. Literature Review
2.1. What is Edutainment?
Gros (2003), has defined edutainment as education that has been placed within the framework
of entertainment This software genre is designed and developed to target parents and teachers
and is specifically designed to focus on academic subjects while commercial gaming software
is developed to target players for purely entertainment purposes.
Edutainment is a hybrid game genre that relies heavily on visuals and narratives or game
formats but also incorporates some type of learning objective (Okan, 2003). The main
purpose of edutainment is to promote student learning through exploration, interactivity, trial
and error, and repetition in such a way that students get so lost in the fun, that they do not
realize they are learning at the same time.
Edutainment software, the Internet and other multimedia products heavily rely on images,
animations, sounds, and other components that engage learners senses, and can provide
immersive learning experiences. Education games can also provide students with experiences
that simulate real life. For example, simulations can recreate lifelike scenarios that can be
used in learning to fly airplanes or to perform knee surgery.
Edutainment games should include the use or acquisition of knowledge in defined subject
areas, use intellectual skills that apply to specific course content, and provide interactive
feedback. The attributes of high quality edutainment software should include learning goals
and objectives that are clear and concise. Games should also provide concept reviews for new
content and a vehicle for questions and answers. Games should be fun. When gamers are
enjoying themselves, they are more relaxed, energetic, alert, responsive, and are less fearful
and more open to learning (Baranich & Currie, 2004; Klaila, 2001).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 66
2.2. Types of Edutainment
Edutainment is an evolving alternative to traditional education method. It can be organized in
different ways. White (2003) (cited in Kowit et al. (2006)), categorized the edutainment in
four (4) different groups, which are:
- Location-based edutainment which can be divided into two categories: interactive &
participatory where children can play and participate in game, and non-interactive &
spectator where children can just be seated and exploring (movie, science show,
museums and zoos).
- Edutainment by purpose and content consists of informal education which is to
improve learners life control, and skills education which is to give experiences, like
simulations.
- Edutainment by target group includes motivation-oriented (learners who have same
interest), and age-oriented (learners who have same age).
- Edutainment by type of media contains: edutainment on TV included: comedic drama,
historical drama, sketch comedy, skills and travel; computer edutainment included
game types: adventure, quiz, role-play, strategy, simulation, and experimental drama;
edutainment on Internet included: tele-teaching and tele-learning systems, and web-
based educational systems; interactive television. These types of edutainment use the
advent of digital television to provide the interactivity via software and hardware and
connect with other telecommunication systems.
2.3. Traditional Teaching and Learning Method
One of the common teaching methods that teachers prefer today is the lecture method. Using
this method, teacher transmits knowledge to the students who sit passively in the classroom
and listen. Another common method is the question-and-answer approach, which was
developed in order to avoid the boredom causer by lectures and to provide more efficient
learning environment. According to Eee Ah Ming (1997) (cited in Mohd Aris (2007)),
traditional teaching focused on the lecture method in delivering the content to the students
and they used one-way communication to explain the idea or principle. The students become
a passive participant in class. This situation will lead the students to become bored to learn
and finally will influence their academic performance.
2.4. Computer Usage in Education
In contrast to the previously described methods, the new technology has been introduced to
integrate with the teaching method, which called Computer-Assisted Instruction (CAI). Using
CAI, the teacher can use computers at different times and places according to the
characteristics of the subject matter, the students, and the available software and hardware.
According to Fisher (1997); Mintz (1993); Plomp and Voogt (1995) (cited in Kara and
Yesilyult (2007)), a computer enables repeated trials of an experiment with considerable ease
in a limited time, provides immediate feedback, allows simultaneous observation on
graphical representation, and offers a flexible environment that enables students to proceed
with their own plans.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 67
3. Research Objective
The purposes of this research are:
i. To identify how edutainment can effects the students achievement.
ii. To identify whether edutainment can increase students interest to study in class.
4. Methodology
4.1. Participants
This research was conducted at a primary school located in Sungai Buloh, Selangor Darul
Ehsan. 60 Standard Three (3) students were selected to involve in this research. All of them
were randomly selected from different class, but they share the same IQ level. The students
are divided equally into two different groups, which is experiment group and control group.
4.2. Instruments
The main instrument used by the researchers in the study was a set of questionnaires
consisting of 2 sections. The first section of the questionnaire covers the questions about the
background of the respondent, while the second section consists of questions that related to
students understanding, interest and teaching aids. The students were given the questionnaire
after the learning process using edutainment software.
4.3. Procedure
The first step in this research is to teach both group of students with the subtopic Letters and
Number. The control group was taught traditionally using chalk and talk. Meanwhile, the
experimental group was taught using the software for Information and Communication
Technology Literacy (ICTL) Year 2 subject entitle Rays Letters and Numbers. This software
is provided by the Ministry of Education to the school. After the learning session ended, the
questionnaire was distributed to the students in experimental group. Permission to conduct
the research was first secured from the school principals and the sessions took place in the
computer lab during the English class. All the respondents were assured that their
participation in the study was voluntary and at anytime they can opt out with any obligation.
4.4. Data Analysis
The data collected during this research was analyzed using Statistical Packages for Social
Science version 12 software (SPSS v12). T-test was used to elicit whether there was a
significance difference among groups for the control group and experimental group.
Significance level was decided by taking p values into consideration p>0.05, meant there was
not a meaningful difference, p<0.05 meant there was a meaningful difference.
5. Findings and Discussion
5.1 Edutainment Software
This research was conducted using the software for Information and Communication
Technology Literacy (ICTL) subject for Year 2 entitle Rays Letters and Numbers given by
Ministry of Education. Figure 1 shows the interfaces for this software.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 68
Figure 1: Interface of edutainment software
5.2 Pre-test and Post-test Result
Both groups had learnt the topic of Letters and Numbers using traditional teaching method.
After the class ended, they had given a set of question that tests their understanding towards
the topic. After two weeks, the students were being taught again with the same topic. This
time, however, the experimental group was brought to the computer laboratory and being
taught using the edutainment software. The result of the students achievement is shown in
Figure 2 and Figure 3.
Figure 2: Pre-test and post-test result for control group.
Pre and post test result for control group
3
2
3
6
11
5
1 1
3
10
8
7
0
2
4
6
8
10
12
Student's marks
N
u
m
b
e
r
o
f
s
t
u
d
e
n
t
s
Pre test
Post test
10 11 12 13 14 15
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 69
Figure 3: Pre-test and post-test result for experiment group
Based on the Figure 2 and 3, the results indicate that the highest number of students in control
group get the 14 mark (11 students) while the highest mark for the students in experiment
group is 12 and 15 (both with the number of students is 8). There is, however, a big different
when compared to the result of post test for experimental group. After having a class using
edutainment software, half of the students (15 students) get the score with 15 marks.
5.3 Analysis of t-test
T-test was used to compare the mean scores for the responses. As seen in Table 1, at the
beginning the pre-test means of control group and experiment group were 4.17 and 4.10
respectively. These results showed that the samples pre-treatment knowledge levels were
much closed to each other and there was not a statistical different between the two groups (p=
0.847, p>0.05).
Table 1: T-test result of pre-test for control group and experiment group.
Value Pre-test Control Group Pre-test Experimental Group
Mean 4.17 4.10
Standard deviation 1.533 1.626
Significant value 0.847 0.847
Yet, at the end of the treatment, the post-test means of control group and experiment group
were 4.47 and 5.07 (as shown in Table 2). A statistical significant difference was found
between the groups (p= 0.005, p<0.05).
Table 2: T-test result of post-test for control group and experimental group
Value Post-test Control Group Post-test Experimental Group
Mean 4.47 5.07
Standard deviation 1.252 1.230
Significant value 0.005 0.005
Pre and post test result for experiment group
3
1
8
4
6
8
0
2 2
3
8
15
0
2
4
6
8
10
12
14
16
Student's mark
N
u
m
b
e
r
o
f
s
t
u
d
e
n
t
s
Pre Test
Post Test
10 11 12 13 14 15
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 70
5.4 Questionnaire Analysis
The questionnaire was given to the respondent in the experiment group after they had a
lesson using edutainment software. The questionnaire is divided into two main sections
which are Section A that focus on the background of the respondent and Section B that
covers the students response towards edutainment software. In this paper, the discussion of
findings will be focused on the second section of the questionnaire.
5.4.1. Students understanding
Figure 4 shows the evaluations result regarding to the students understanding towards the
teaching topic (English subject). As we can see from the graph, 96.7 % (29 students) of the
respondents expressed that the usage of edutainment software helps them to learn English
subject, 93.3% (28 students) said that the edutainment software helps to increase their
understandings towards the teaching topic and also edutainment software helps them to spell
better in class. 90% (27 students) of the students also agreed that the Edutainment software
give them more information through various examples. When asked about the usage of
instructions in edutainment software, 80% (24 students) said that the instructions help them to
play and use the edutainment software.
Figure 4: Evaluation result of students understanding towards English subject
5.4.2. Students Interest
The respondents also had been asked about their interest about the edutainment software. In
Figure 5, more than 85% (26 students) expressed their positive interest about the edutainment
software. 96.7% (29 students) said that they like to use this software and it helps to increase
their interest to learn English subject. 93.3% (28 students) said that the learning and teaching
process become more interesting when they learned using this interesting Edutainment
software and 86.7% (26 students) said that the usage of Edutainment software encourage
them to attend English class.
Students understanding towards English subject
using Edutainment software
28 28
24
27
29
2 2
6
3
1
0
5
10
15
20
25
30
35
I
n
c
r
e
a
s
e
u
n
d
e
r
s
t
a
n
d
i
n
g
S
p
e
l
l
b
e
t
t
e
r
I
n
s
t
r
u
c
t
i
o
n
h
e
l
p
t
o
p
l
a
y
G
e
t
m
o
r
e
i
n
f
o
r
m
a
t
i
o
n
H
e
l
p
l
e
a
r
n
E
n
g
l
i
s
h
N
u
m
b
e
r
o
f
s
t
u
d
e
n
t
Yes
No
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 71
Figure 5: Evaluation result regarding the interest in using edutainment software
6. Conclusion
As education design becomes more complex and challenging, a new form of teaching is
required in delivering a new knowledge, integration and a more democratic relationship
between teacher and students. Educators should vary their teaching method in order to
increase students interest and understanding. There are various methods that can be chose to
help them in delivering their knowledge to the students. Educators have to be creative and
innovative in order to choose the right teaching method, at the right time, for the right
students.
Despite the fact that students enjoy learning in the educational software setting, they are
seldom used in an educational environment to enhance learning outcomes. Reasons for their
absence from education include the high expense to develop games and very few games are
correlated with the curriculum. It is true that digital games should be used only as a tool to
supplement the curriculum rather than substitute for it. Educators can ignore the trend or they
can harness the great learning potential of digital games, allowing students to learn by
exploring virtual worlds, collaborating with each other, and solving problems without
realizing they are learning.
It is a big hope that this study will serve as a reason for further interest in the scope of
educational software on students understanding of English concepts and learning
achievements.
References
Bryce, J., & Rutter, J. (2003) Gender dynamics and social and spatial organization of
computer gaming. Leisure Studies, 22, 1-15.
Gros, B. (2003). The impact of digital games in education. First Monday, 8(7). Retrieved
December 5, 2009, from http://firstmonday.org/issues/issue8_7/gros/index.html
Students interest towards Edutainment software
29
28
29
26
1
2
1
4
0
5
10
15
20
25
30
35
Like to use Interesting Increase
interest
Encourage to
attend class
N
u
m
b
e
r
o
f
s
t
u
d
e
n
t
Yes
No
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 72
Kowit Rapeepisarn, Kok Wai Wong, Chun Che Fung, Arnold Depickere (2006). Similarities
and differences between "learn through play" and "edutainment". IE '06: Proceedings
of the 3rd Australasian conference on Interactive entertainment. retrieved February
27, for ACM database (Masterfile) on the World Wide Web: http://portal.acm.org
Mary Green, Mary Nell McNeese (2007). Using Edutainment Software to Enhance Online
Learning. International Journal on ELearning. Norfolk: 2007. Vol. 6, Iss. 1; p. ,
retrieved January 27, for ProQuest database (Masterfile) on the World Wide Web:
http://proquest.umi.com
Okan, Z. (2003). Edutainment: Is learning at risk? British Journal of Educational Technology,
34 (3), 255-264.
Sharon DeVary (2008). Educational Gaming: Interactive Education. Vol. 5, Iss. 3; p. 35,
retrieved January 27, for ProQuest database (Masterfile) on the World Wide Web:
http://proquest.umi.com
Yilmiz Kara and Selami Yesilyurrt (2007). Assessing the effects of tutorial and edutainment
software programs on students achievements, misconceptions and attitudes towards
Biology. Asia-Pacific Forum on Science Learning and Teaching. Volume 8, Issue 2,
Article , retrieved January 27, for ProQuest database (Masterfile) on the World Wide
Web: http://proquest.umi.com
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 73
THE USE OF ICT IN HEALTHCARE ORGANIZATION
Mohamad Norzamani bin Sahroni, Siti Asma bte Mohammed
Universiti Teknologi MARA Malaysia
zamani@tmsk.uitm.edu.my
Universiti Perguruan Sultan Idris
siti_asma@ftmk.upsi.edu.my
Abstract
Healthcare organization received the biggest benefit through information systems innovation
in its business process. This study was carried out to determine the extent of the use of ICT in
healthcare organization and to collect as much issues related to it. The study conducted in
mixed method through questionnaire survey and observation on healthcare organization. The
evaluation is based on Donabedians model. Findings of the study are; most clinics were
using information systems but not to the extent maximizing the potential benefit of the
information system itself, and most clinics were using Internet applications but limited to use
email and third party Extranet such as insurance company and patients employer systems for
claim purposes. Some issues and further research also highlighted in the discussion.
Keywords: Information Systems, Health, Computer Use, Evaluation, Mix Method
1. Introduction
ICT in healthcare is able to increase quality and safety of patient care. It is part of healthcare
structure in any organizations to support the processes and consequently to deliver better
outcome to organization and particularly to the patient (Donabedian 2003). The mean of ICT
are primarily own of computers, use of clinic information systems, and Internet and its
application such as email and website. Meanwhile, healthcare provider includes both
individuals and their organizations, such as a hospital or physician practice (2009). In this
study, types of healthcare organization that are taken into account were private hospitals,
health centre and clinics. Thus the objectives of this study are to determine the extent of the
use of ICT in healthcare organization and to collect as much issues related to it.
2. Method
A questionnaire survey was conducted to all health care providers that already identified
randomly in the district of Shah Alam. The questionnaire was adapted from dental practices
survey (John, Thomas et al. 2003). Out of 41 organizations, 37 are clinics, 2 private hospitals
and 2 center of health. A self-administered questionnaire was used to collect data in October
2009. Respondents were also given opportunity to write any related answer to certain
questions for further clarifications or additional information. Once again respondent can give
comments on any issue related to this area at the end of the questionnaire.
Because of number of sample is small, the analysis is carried out using spreadsheet. The
study also carried out an observation to several healthcare organization; 4 clinics and 2
hospitals for further investigation. It is a good method to understand better about processes in
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 74
health (Friedman and Wyatt 2006). For the ease of discussion, the word clinic will represent
all respondents except any specified discussion related to center of health or hospital.
3. Results
3.1 Profile and Number of Computer
There was no doubt that all clinics are using computer for daily use. Table 1 shows the profile
of the clinics in terms of number of computer, amount of IT investment, number of doctors
and number of supporting staff.
3.2 The Use of Information Systems
Out of 41 healthcare organizations, only 29 organizations (70.7%) claimed that they are using
information systems. The distribution of year use of systems is as in Figure 1. The figure
shows that the trend of implementation is increasing from the year 2000 to the year 2008.
There were various kind of systems used from the name given by the respondents. However
there were two clinics claimed that they were also used a system by giving the name of the
database management software. It is also counted in the figure.
Table 1: Profile of Respondents
N = 41* %
Number of Computer
1-3 27 65.9
4-6 6 14.6
> 6 8 19.5
Amount of Investment
< RM 15000 17 41.5
RM 15000 RM 30000 7 17.1
> RM 30000 12 29.3
Number of Doctor
1-3 23 56.1
4-6 12 29.3
> 6 5 12.2
Number of Supporting Staff
1-3 19 46.3
4-6 11 26.8
> 6 9 21.9
* Some respondents are not answering this part.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 75
Figure 1 Number of healthcare organizations
implementing information systems
There were various functions used in the systems by the clinics. Figure 2 show that, the
majority (68.3%) of organizations claimed that they used the system for patient registration.
It is followed by storing patients prescription (63.4%), medication inventory (56.1%),
storing diagnosis information (41.5%), scheduling patient appointment (39.0%) and
managing account (34.1%). While the other functions are used for storing digital x-ray
(9.8%) and enabling patient viewing own medical history online (2.4%).
Figure 2 Percentage of clinics use various
functions of information systems
* Respondents could select more than one option
While majority of the respondents were using information systems, there were also clinics
opted not to use it. These represent 29 percent or twelve out of forty-one clinics. However
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 76
two of them claimed that they are using system but limited the system by using office
application such as spreadsheets and word processing. It is considered as no proper systems
used by that particular clinics. Table 2 describes the details on reasons why were they opted
not to use systems. 66.7 percents claimed that it is much easier for them to work with manual
systems while 50 percents said it is too expensive to have systems and 41.7 percents believed
that it was not necessary to computerize at present.
3.3 Internet Access
Majority of clinics have an Internet access except two clinics, where from the analysis on the
questionnaire these two clinics were purely work on paper based and have no systems at all.
Figure 3 describes the use of Internet by clinics. The highest use of Internet is purposely to
make online claim through Extranet (70.7%) for third party such as insurance company,
managed care organization (MCO) or the patients employer. 63.4 percents respond for
electronic mail, 53.7 percent for searching medical information and followed by updating
website (36.6%).
For email purposes, 48.8 percents reported that email was used for communicating with third
party such as insurance company and medical provider. It is followed by personal use 39.0
percents and appointment matters (scheduling and reminder) 26.8 percents.
Table 2: Reasons for not using information systems
N = 12* %
Easier with manual system (using form)
8
66.7
Too expensive 6 50.0
Not necessary at the moment 5 41.7
Others
2
16.7
* Respondents could select more than one option
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 77
Figure 3 Type of Internet Use
* Respondents could select more than one option
Meanwhile for website purposes, 15 respondents claimed that they have website to update; to
promote their services (100.0 %), to publish medical information (53.3%) and for
advertisement (20.0%). Adversely, there were some reasons for those (26 respondents) who
did not have a website. As listed in Figure 4, website is not required currently (51.0%),
clinics did not have own expertise to develop website (24.0%), too expensive to set up
website (22.0%), and the last factor which is interestingly to further investigate is that any
health provider cannot do any promotion related to services offer to public (2.7%) as stated in
Malaysia Medical Association (MMA) guideline.
Figure 4 Reason for not establishing website
* Respondents could select more than one option
4. Discussion
The discussion of this study will be based on Donabedians Model (Kunkel, Rosenqvist et al.
2007). This model consists of three approaches namely structure, process and outcome in
order to analyze the quality of care (Donabedian 1987), (Donabedian 1997), (Donabedian
2003). Structure of the health systems means equipment, people, relationship among user
(physicians), patients and the technology, and financial resources. Kunkel and Westerling
(Kunkel and Westerling 2006) describe it as organization resources and administration.
Processes mean any process or procedure that occur during health activities; diagnose,
prescription, medication dispensing and other appropriate activities before, after or at the
point of care given to the patient. Outcome reflects more on changes in patients health status,
and impact on patients and physicians. Klecun and Cornford (Klecun and Cornford 2005)
justified that information systems introduced in health care organization is considered an
innovation that need to be evaluated. Further, Friedman and Wyatt (2006) emphasized that
any innovation in health should be assessed based on this triad factors.
In the age of information and knowledge, organizations are becoming dependent on
technologies. It is proven that all clinics own computers if not all to have so called clinic
information systems to help doctors and support staff doing daily tasks. While majority has
an Internet access, however it is limited to access third party extranet and email. The same
respondents provide the same perception on the importance of Internet and its application as
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 78
in Figure 5. Meanwhile the use and the importance of website are considered at low level.
One surprise reason that was given by one respondent is that they have to adhere on what the
Malaysia Medical Association guideline mentions that all clinics are not allowed to publish
any services except during the opening of the clinics (The-Malaysian-Medical-Association
2002). Website supposes to be a significant tool in order to develop health information
society because patient and physician or public and expert can gain knowledge and share
information. Another application used by one respondent is the use of short messaging
system (SMS) as an appointment reminder to the patients. This notification system is working
well rather than email for both clinic and patient.
Further study is needed for the case related to Code of Ethics introduced by Malaysian
Medical Association and the use of SMS in clinics. It can be described that health care
organization still very far behind especially to develop personal health to the public. In terms
of structure, clinics done well to establish internal administration structure for own benefits.
Figure 5 Perceptions on the importance of Internet and its
application in business
Next factor is processes related to health procedure and information systems. Appendix 1
described an observation of processes involved in general practice in clinics or outpatient in
hospital. The observation is to get further clarification on respondents feedbacks on what
kind of functions used in the systems and how the functions interact from one process to
another. Even though clinics claimed that they have a system, the system is not fully
integrated or fully computerized from the registration process towards the dispensing of
medicine. The shaded boxes suggested that the processes could be fully computerized and
bring more benefits to organization. The process can be summarized in 4 main processes;
registration, consultation, pharmacy, and payment as in Table 4.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 79
Table 4: Four main process in outpatient setting
Process Current Propose Reason
Registration Fill-up Form Use identity card
or insurance card
Paperless
Online claim
Consultation Notes on
paper &
Notes in
computer
(Text based)
Symptoms
Prescription
Notes in
computer
(Structured
instead text based
with sketch)
Symptoms
Prescription
Dos calculation
Easy to review medical
history
Clarity on drugs avoid
homonym
Exact dose calculation
Pharmacy Transcribe
prescription
Read prescription Avoid giving wrong
medicine
Payment Manual
calculation
Auto calculation
based on number
of medicine
Avoid mistakes and faster
This finding shows that, qualitative approach (observations) give a better picture about
processes developed in the information systems. The processes that are not sufficiently
provided in the systems will lead to some problem to the user and the patients.
The last factor is about outcome from the use of the systems. The study only assessed the
respondents perceptions towards using the systems and the importance of Internet for
business use. Dependent on technology in a positive way where respondents believed with
information systems they can reduce the use of papers (65.9 % from 29 respondents),
increase time to perform certain tasks such as searching on patient records (68.3%), better on
reading prescriptions instead on transcribing (51.2%) and accessibility to patients medical
history electronically (58.5%). Negatively, they also face problems when dealing with
information systems. Out of 29 respondents, 29.3 percents claimed that there are some reports
that cannot be generated from the systems, 26.8 percents claimed that the systems itself
cannot communicate with the computers in the clinics, 22.0 percents claimed that inefficient
maintenance by vendor, 14.6 percents because of systems error, 13.8 percents agreed that
problem with black-out makes them to work manually and need to update the data
immediately. However black-out should not be an issue if they apply uninterruptible power
supply as part of their disaster recovery planning.
5. Conclusion
There is no doubt on the importance of ICT in any organization especially in health. With a
very limited financial resource for this study, the findings can only describe the level of ICT
usage in health organizations, issues and problems claimed by respondents, and the
application of triad factors structure-process-outcome in this study. With ICT, clinics could
contribute more on developing information health society rather than applying the ICT for
internal use.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 80
6. References
(2009). "HIPAA Definitions." Retrieved 20 September 2009, 2009, from
http://security.louisville.edu/Resources/Forms/hipaa-
definitions.html#HealthcareProvider.
Donabedian, A. (1987). "Commentary on Some Studies of the Quality of Care." Health Care
Financing Review Annual Suplement.
Donabedian, A. (1997). "The quality of care: How can it be assessed?" Archives of Pathology
& Laboratory Medicine.
Donabedian, A. (2003). An Introduction to Quality Assurance in Health Care. New York,
Oxford University Press.
Friedman, C. P. and J. C. Wyatt, Eds. (2006). Evaluation Methods in Biomedical Informatics.
Health Informatics Series, Springer.
John, J. H., D. Thomas, et al. (2003). "Questionnaire survey on the use of computerisation in
dental practices across the Thames Valley region." British Dental Journal 195(10).
Klecun, E. and T. Cornford (2005). "A critical approach to evaluation." European Journal of
Information Systems 14(3): 229-243.
Kunkel, S., U. Rosenqvist, et al. (2007). "The structure of quality systems is important to the
process and outcome, an empirical study of 386 hospital departments in Sweden."
BMC Health Services Research 7(104).
Kunkel, S. T. and R. Westerling (2006). "Different types and aspects of quality systems and
their implications: A thematic comparison of seven quality systems at a university
hospital." Health Policy 76(2): 125-133.
The-Malaysian-Medical-Association. (2002). "Code of Medical Ethics." Retrieved 17
January 2010, 2010, from
http://www.mma.org.my/Portals/0/pdf/MMA_ethicscode.pdf.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 81
Appendix 1 Processes in Outpatient Setting
Regis-
tration
Consul-
tation Phar-macy Pay-ment
Fill-up
Form Q-Number
Diagnosa +
History
Write
Prescription
Drug/
Medicine
Dose
Calculation
Send
Prescription
Receive
Prescription Q-Number Prescription
WriteDrug&
DoseOnLabel
Stick
Label
on
Bottle
etc
Check
Drug
Dispense
Drug
Receive
Prescription
Payment -
TotalToPay
PH Manual Automation Manual Manual Manual Manual
Manual (by
Patient) Manual Automation
Transcribe
(+ Read) Manual Manual Check Dispense Manual Manual
GH
Automation
(IS) Automation
Automation
(IS)
Automation -
Text Based Manual Manual
Manual (by
Patient) Manual Automation Read Manual Manual
Check
(2x) Dispense NA
Automation
(IS)
C1 Manual Manual
Automation
(IS)
Automation -
Text Based Manual Manual
Automation
(IS)
Automation
(IS) NA Read Manual Manual NA Dispense NA Manual
C2 Manual Manual
Automation
(IS)
Automation -
Text Based Manual Manual
Automation
(IS)
Automation
(IS) NA Read Manual Manual NA Dispense NA Manual
C3 Manual Manual
Automation
(IS)
Automation*-
Text Based Manual Manual
Automation
(IS)
Automation
(IS) NA Read Manual Manual NA Dispense NA Manual
C4 Manual Manual Manual Manual Manual Manual Manual Manual NA
Transcribe
(+ Read) Manual Manual NA Dispense NA Manual
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 82
KNOWLEDGE MANAGEMENT:
AN IMPLEMENTATION OF K-PORTAL IN FIIT, UNISEL
Nur Razia Mohd Suradi, Hema Subramaniam
Universiti Industri Selangor
razia@unisel.edu.my, hema@unisel.edu.my
Abstract
The culture of knowledge sharing in the organization play a vital role as to ensure the
knowledge is shared among the faculty staff. Knowledge sharing culture contributes to a
positive working environment. Currently, there is no platform for the Faculty of Industrial
Information Technology (FIIT), Unisel academic staff to share knowledge among them. As it
is done manually, the sharing process is through common meeting or by any offline
discussions. There is no repository for future retrieval. However, with open source solution
the development of knowledge based application may reduce the cost tremendously. In this
paper we discuss about the domain on which this knowledge portal is being developed and
also the deployment of open source tools such as JOOMLA, PHP programming language and
MySQL. This knowledge portal is the evidence that open source tools also reliable in
developing knowledge based portal. These recommendations will be useful to the open
source community to produce more open source products in the future.
Keywords: Knowledge management, Portal, Content Management, JOOMLA (Barclay &
Murray, 1997)
1. Introduction
The need of knowledge management in the organization is to create alternative way to access
the information from the staff (Barclay & Murray, 1997). The aim of knowledge portal is to
provide views onto domain specic information on the World Wide Web, thus facilitating
their users to nd relevant, domain specic information (Staab, 2001). Hence, to develop a
portal, we need reliable software, knowledge and technical skill. Purchase suitable software
that suits our needs will require money and time consuming. But not many organizations has
sufficient budget for it. Therefore, Faculty of Industrial Information Technology (FIIT),
University Industry Selangor has decided to develop knowledge portal using open source
tools. Open source software can be defined as that is made available freely to all and many
of them voluntarily contribute developing software for the organization (Hippel & Krogh,
2003). This portal can be accessed from any clients computer connected to the internet. The
purpose of this knowledge portal is to be a catalyst centre of knowledge information within
the FIIT, UNISEL. It is hoped that the portal will increase the efficiency and productivity of
the faculty by eliminating manual and offline knowledge sharing.
Domain Analysis
A portal is a Web-based application that acts as a gateway between users and a range of
different high-level services. Before developing the knowledge portal, we need to understand
the domain or the boundary for the portal being developed (Asif, Dhamesh, Xiao, Xiaobo, &
Rob). Here, the domain is higher learning institute (HLI) and focusing on knowledge sharing
information in FIIT. The traditional ways of sharing information or knowledge in FIIT are as
listed below:-
- Faculty Meeting
- Informal discussion
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 83
- Faculty Activities
- Email
- Chatting Yahoo Messenger, Skype and others (Asif, Dhamesh, Xiao, Xiaobo, &
Rob)
- Mobile device SMS
- Document Sharing
- Pen/Thumb drive, CD, external hard disk
The entire communication channel as stated above did not have any repository for future
retrieval. These knowledge is only available at current time and may be lost or damage in
future. The proposed knowledge portal is being developed in web based environment which
can be accessed via internet or wireless connection. Figure 1 show the environment, where
the knowledge portal resides.
Figure 1 Knowledge Portal environment
2. Methodology
The system development life cycle (SDLC) is the process of developing systems through
investigation, analysis, design, implementation, testing and deployment until the maintenance
of the system. The documented collection of policies, processes and procedures used by a
development team or organization to practice software engineering is called software
development methodology (SDM) or system development life cycle (SDLC) (Chapman,
2004). In developing a software, the methodology used need to be defined and the best
technique have to be selected. Among the software methodology available are Agile Software
Development, Extreme Programming, Joint Application Development, Waterfall, Spiral,
Rational Unified Process (RUP) and etc (Chapman, 2004). Here, RUP has been chosen due to
the advantages of this technique. In RUP, we divide the features in iterative approach. The
most important features will be delivered first and continued with the less important features.
Figure 2 below depicts the RUP process.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 84
Figure 2: RUP process (Rational Software Development Company, 1998)
3. Software Requirement
For any development the tools and techniques selection for development is a challenging task
to complete. During the requirement phase, K-Portal team already decided to use content
management system to develop this portal based on 2 factors; time constraint and resource
allocation. The time allocated to develop this K-Portal is very limited and we are lacking of
resources in terms of human and hardware. Content management system also enable non
technical user with no knowledge on computer programming, graphic imaging tools, or
markup language like HTML to add new material to a website or modify the existing
contents as and when required in an intuitive and real-time fashion (Abaxi-Bexheti, 2008).
All this factors need to be considered when we choose to use content management system as
our tools of development. These factors can be illustrated as in Figure 3.
Figure 3: Factors to choose development tools
After we consider the above illustrated factors, we come across with many content
management systems that provide more or less functionality alike. The comparison between
open source CMS application that available in market is as listed down in table 1.
Factors to choose
development tools
Time Allocated
Resource
Allocated
Budget allocation
Human allocation
Development
environment
Hardware
consideration /
availability
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 85
Table 1: Web Content Management System Comparison (Austin, 2010)
Programming
Language
Database Web Server FTP
Support
UTF-8
Support
Joomla PHP MySQL Apache Provided as a
free add-on
Limited
support
available
Drupal PHP MySQL,
PostgreSQL
Apache, IIS Limited FTP
support
Available
Mambo PHP MySQL Apache, IIS,
any PHP-
enabled web
server
Not available Available
Open
CMS
Java 1.4 MySQL,
PostgreSQL,
Oracle,
MSSQL
Tomcat,
Apache
Not available Available
PHP Nuke PHP MySQL,
PostgreSQL,
mSQL,
Interbase,
Sybase
Apache, IIS Not available Not
provided
Plone Python Zope Apache, IIS,
Zope
Available Available
TYPO3 PHP MySQL,
PostgreSQL,
Oracle,
MSSQL
Apache, IIS Available Available
WordPress PHP MySQL Apache, mod
rewrite
Available as
a free add-on
Available
Xoops PHP MySQL Apache, IIS Available Limited
support
available
After considering the differences between the open source web CMS, we have decided to use
JOOMLA as our development tools for knowledge portal. Availability of support and
stability of the tools itself become the reason for our decision. JOOMLA as open source web
CMS contain PHP as programming language, MySQL as a database and Apache Tomcat as a
web server.
4. System Architecture
Architecture of a system always depends on development tools. JOOMLA architecture being
utilize in K-Portal development is based on the reason that JOOMLA is the main
development tools for K-Portal. JOOMLA architecture also known as 3-tier architecture
(North, 2009). It consists of 3 layers: Extension layer, application layer and framework layer.
Utilization of these 3 layers in K-Portal will be discussed in the next section.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 86
Agro Forum
ionFiles
QuickFAQ
Remository
WebLinks
Components
Forum
Download
Materials
K-Portal
FAQ
Teaching Material
Other Application-
Provide link to
download installer
K-Portal Menu
4.1. Extension Layer
Extension layer consists of modules, components and templates. K-portal was developed
using appropriate modules and components. All this modules and components are simplified
in figure 4.
Figure 4: Components in K-Portal
4.2. Framework Layer
Framework layer consists of libraries and plug-ins. Libraries are required by the Framework
or are installed for use by third-party developers. Meanwhile, plug-ins extend the
functionality available in the Framework. Remository component used in k-portal come with
plug-in such as audio and video features. These plug-ins are disabled because of space
unavailability issue.
4.2. Application Layer
The middle application layer consists of applications that extend the Framework JApplication
class. Currently there are four applications included in the Joomla distribution. JInstallation,
JAdministration, JSite and XML-RPC. JInstallation is responsible for installing Joomla on a
web server and is deleted after the installation procedure has been completed. JAdministrator
is responsible for the back-end Administrator (Kennard, 2007). JSite is responsible for the
front-end of the website. Meanwhile, XML-RPC supports remote administration of the
JOOMLA website.
5. FIIT K-portal Features
FIIT knowledge portal is developed with an intention to encourage knowledge sharing culture
among academic staff. At the same time this knowledge portal will help the academic staff to
discuss topics regarding the research interest group. This knowledge portal can be a platform
for them to communicate and share their ideas regarding the subject they teach and also the
research that they involve. The arrangement of the menu item in portal shows the realization
of the objective stated above.
The contents of portal are as follows:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 87
Table 2: FIIT K-Portal Features
Features Description
Registration - Faculty member will be registered by web master.
- Web master will deal with admin to get details about staffs.
Paper Presented - Paper that already presented by faculty member either internal or
external will be published here for knowledge sharing and
acknowledgement by other faculty members.
Conference - Provide list of web links to upcoming academic and research events
either local or international events.
General
Information
- Other unregistered user can view this page which contains UNISEL
website and FIIT WEBSITE.
- They can also retrieve some information about FIIT K-portal itself.
News/Announce
ment/Event
- Latest information regarding any faculty activities provided by Deans
PA and will be upload by K-portal web master.
Collaboration - In this column, any information that relates to Industrial Training and
Industrial Collaboration Program will be updated here by K-portal web
master.
- All info regarding industrial training and industrial collaboration
program will be given by person in charge.
Other application - It contains link to other application.
- This link can be divided into four types; Freeware, Shareware, Public
domain and Open source.
Download
Material
- All FIIT internal forms template can easily be uploaded here.
Teaching Material - Lecturers can retrieve a complete lectures note, assignment, quizzes,
exam questions and schemes, etc.
- All information will be put accordingly in a different folder based on
program, course subject and semester.
Help - It contains guideline on how to use the FIIT K- portal
6. Result
In Figure 5 below, the main page of K-portal is being developed using open source
application. K-Portal is a knowledge portal for faculty community which enables the all the
staff including dean, lecturer, HOP to meet, to interact and to share knowledge regardless
time and place. The portal is built based on the need of the faculty community and provides a
cost effective platform for the FIIT staff. It has been tested through a pilot implementation
and shows good response on how ICT can be leveraged in improving how we enable the
knowledge sharing and it is timely as knowledge has become important in our teaching,
research activity and yet serves as knowledge platform. It is hoped that K-portal will continue
to grow and in the long run it gives a positive impact. It could be used to access updated
information for better sharing culture.
Therefore, K-Portal would increase knowledge capturing and retrieval skills and knowledge
and would also narrow the gap among the faculty members either existing or new staff.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 88
Figure 5: Main page of K-Portal
References
Abaxi-Bexheti. (2008). Development of a learning content management system. WSEAS Tran
Information Science and Application , 1001-1010.
Asif, A., Dhamesh, C., Xiao, W. D., Xiaobo, Y., & Rob, A. (s.d.). A Service Oriented
Architecture for Portals Using Portlets.
Austin, B. (2010). Comparison With Other Web Content Management Systems. Consult le
July 30, 2009, sur InternetTIPS.com: http://www.internettips.com/departments/joomla-web-
content-management-system/
Barclay, R. 0., & Murray, P. C. (1997). Knowledge Praxis. Consult le March 27, 2010, sur
What is Knowledge Management: http://www.media-access.com/whatis.html
Chapman, J. R. (2004). Software Development Methodology. Consult le March 2010, sur
http://www.hyperthot.com/pm_sdm.htm.
Hippel, E., & Krogh, G. (2003). Open Source Software and the "Private Collective"
Innovation Model: Issues for Organization Science. Organization Science , 209-223.
Kennard, J. (2007). Mastering Joomla 1.5 Extension and Framework Development: The
Professional Guide to Pragramming Joomla. Packt Publishing.
North, B. (2009). Joomla 1.5: a User's Guide: Building a Succesful Joomla Powered
Website. Prentice Hall.
Rational Software Development Company. (1998). Rational Software White Paper: Best
Practices in Rational Unified Process. Cupertino: Rational Software.
Staab, S. (2001). Knowledge Portal. Human Language Technology and Knowledge, (p.
Volume 2001).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 89
MODEL PEMBELAJARAN E-TAJWID (ETLM) BERASASKAN SEMANTIK DAN
ELEMEN MULTIMEDIA.
Nor Hashidah Mohd Nasir, Fauziah Baharom, Harryizman Harun, Haslina Mohd, Ali
Yusny Daud, Norida Darus, Ahmad Ghadafi, Azman Yasin
Bidang Sains Gunaan, College of Art & Sciences
Universiti Utara Malaysia, Sintok Kedah Darul Aman
shidanadira@yahoo.com
Abstrak
Penyelidikan ini akan membangunkan model pembelajaran e-Tajwid (eTLM) untuk
memudahkan pengguna mempelajari Ilmu Tajwid dengan lebih praktikal. Pelbagai masalah
yang dihadapi oleh pelajar dalam mempelajari Ilmu Tajwid. Antaranya pelajar tidak dapat
mengingati dan memahami hukum Tajwid dengan baik, bantuan pembelajaran adalah terhad
dan kelemahan pengajaran guru menjadi faktor pencapaian pelajar dalam menguasai Al-
Quran dan Tajwid. Penyelidikan ini menfokuskan kepada pembangunan eTLM yang
melibatkan gabungan semantik dan elemen multimedia dalam menghasilkan persekitaran
yang lebih interaktif dan intuitif. Konsep semantik diadaptasikan ke dalam eTLM supaya ia
mampu memberi pemahaman yang lebih mendalam kepada pengguna tentang sesuatu hukum
Tajwid. Manakala, penggunaan multimedia pula boleh membantu menarik minat serta
meningkatkan lagi daya ingatan pengguna tentang Ilmu Tajwid. Penyelidikan ini melibatkan
lima fasa utama iaitu kajian secara teori dan pengumpulan maklumat, pembangunan model,
rekabentuk prototaip berdasarkan model yang telah dibangunkan, serta pembangunan dan
penilaian prototaip.
Kata kunci: Tajwid, e-pembelajran, semantik, elemen multimedia.
1. Pengenalan
Dunia kini telah mengecapi perubahan seiring dengan perkembangan teknologi. Anjakan
paradigma ini telah merubah corak, konsep dan gaya kehidupan manusia. Namun begitu,
perubahan seperti ini tidak mampu untuk mengubah keperluan manusia terutama keperluan
mempelajari Al-Quran. Ini adalah kerana Al-Quran merupakan asas dalam kehidupan
seorang muslim khususnya dalam bidang pendidikan. Sabda Rasulullah S.A.W bermaksud,
Orang yang paling baik di antara kamu ialah orang yang belajar Al-Quran dan
mengajarkannya kepada orang lain (HR. Bukhari).
Hukum mempelajari Ilmu Tajwid adalah Fardhu Kifayah dan mengamalkannya iaitu
membaca Al-Quran dengan bertajwid adalah Fardhu Ain bagi setiap muslimin dan muslimat
yang mukallaf (HR Bukhari). Pembelajaran Al-Quran dan Tajwid masa kini dilaksanakan
melalui pelbagai kaedah yang berbeza. Namun, terdapat pelbagai masalah yang sering
dihadapi oleh pelajar semasa mempelajari Ilmu Tajwid. Antaranya adalah pelajar tidak dapat
mengingati dan memahami hukum Tajwid dengan baik, kegagalan guru dalam menyediakan
bahan bantu mengajar yang baik kepada pelajar dan penggunaan e-pembelajaran berkenaan
Tajwid yang terdapat di Malaysia terhad dan kurang interaktif.
Oleh itu, satu pendekatan telah diambil bagi memudahkan lagi proses pengajaran dan
pembelajaran (P&P) Ilmu Tajwid di mana penyelidikan ini akan mengaplikasikan e-
pembelajaran, semantik dan elemen multimedia. Semantik diaplikasikan dalam Ilmu Tajwid
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 90
kerana dapat menghuraikan makna sesuatu hukum Tajwid dengan lebih terperinci dan
mendalam. Tambahan lagi, multimedia pada masa kini telah memainkan peranan penting
dalam bidang pendidikan. Multimedia dapat menghasilkan pembelajaran yang berkesan, dan
dengan pengaplikasiannya juga dapat menyumbang serta memudahkan perkembangan
intelektual seseorang pelajar (Heinich, et al., 1996).
2. Tajwid
Takrifan Tajwid dari segi bahasa, ialah memperelokkan atau mencantikkan (Abdullah al-
Qabbani, 1990; Bashir et al., 2003). Manakala dari segi istilah pula, Tajwid bermaksud
sesuatu ilmu untuk melafaz huruf-huruf Al-Quran dengan betul (Abdullah al-Qabbani, 1990).
Rasulullah S.A.W pernah bersabda, dalam hadisnya yang maksudnya: Bacalah olehmu Al-
Quran, maka sesungguhnya ia akan datang pada hari kiamat memberi syafaat/pertolongan
ahli-ahli Al-Quran (yang membaca dan mengamalkannya.) (HR. Muslim).
Terdapat beberapa kelebihan mempelajari Ilmu Tajwid (Zarina et al., 1999) termasuk, Ilmu
Tajwid adalah semulia-mulia ilmu kerana Ilmu Tajwid berkait secara langsung dengan kitab
Allah iaitu Al-Quran, mencapai kejayaan dan kebahagiaan serta mendapat rahmat dan
keredhaan Allah di dunia dan akhirat (Glosari Al-Quran, 1992). Justeru, e-pembelajaran juga
turut memainkan peranan penting dalam proses P&P Tajwid untuk menyampaikan
kandungan serta maklumat tentang Tajwid melaluinya seperti Mad Asli, Idhgam dan
sebagainya.
3. E-Pembelajaran dan Pembelajaran Tradisional
Secara umum, menurut Rosenberg (2001), e-pembelajaran adalah sebarang P&P yang
menggunakan rangkaian elektronik (LAN, WAN atau Internet) untuk penyampaian isi
kandungan, interaksi ataupun pemudahcara. Pelbagai kelebihan yang boleh diperolehi apabila
menggunakan e-pembelajaran berbanding pembelajaran secara tradisional yang telah
disenaraikan dalam Jadual 1 dibawah (Rosenberg, 2001).
Jadual 1: Perbezaan pembelajaran Tradisional dengan e-pembelajaran (Rosenberg, 2001)
Tradisional Elektronik
Pembelajaran adalah berpusatkan guru Pembelajaran lebih difokuskan kepada
pelajar
Modul pengajaran hanya bergantung kepada
buku teks semata-mata
Pencarian maklumat tidak terbatas
Pengetahuan pelajar adalah terbatas Tahap pemahaman pelajar lebih tinggi
Masa pengajaran dan pembelajaran terhad Masa pengajaran dan pembelajaran lebih
fleksibel
Pelajar hanya bergantung kepada guru Pelajar lebih berdikari
Oleh itu, penggunaan e-pembelajaran sebagai suatu penambahan dalam proses pengajaran
dan pembelajaran dalam bilik darjah harus dipertingkatkan di setiap sekolah di Malaysia.
Selain itu, aspek keberkesanan dan faktor-faktor penggunaan e-pembelajaran juga harus
dikenalpasti supaya pelaksaan pembelajaran mendatangkan kesan kebaikan berbanding
keburukan. Justeru, penggunaan e-pembelajaran perlu diadaptasikan ke dalam pembangunan
eTLM kerana pelbagai kelebihan diperoleh berbanding dengan pembelajaran tradisional.
Penggunaan e-pembelajaran dapat dijadikan sebagai medium untuk menyampaikan Ilmu
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 91
Tajwid kepada pengguna pada bila-bila masa dan di mana sahaja. Untuk membangunkan e-
pembelajaran Tajwid yang lebih berkesan, menarik minat pengguna, interaktif dan intuitif,
elemen multimedia perlu dimasukkan agar penyampaiannya lebih berkesan.
4. Multimedia dan Kepentingannya
Menurut Hofstetter (1995), multimedia merupakan penggunaan komputer bagi
mempersembahkan dan menggabungkan teks, grafik, audio dan video dengan alatan yang
membolehkan pengguna mengarah, berinteraksi, mereka cipta, dan berkomunikasi.
Multimedia menukar gaya pembelajaran pada hari ini dengan menjadikan pembelajaran lebih
dinamik dengan penggunaannya (Feldman, 1997). Justeru itu, dalam pendidikan, anjakan
paradigma dalam sistem masyarakat secara tidak langsung mempengaruhi pembangunan
sistem pembelajaran. Antara kelebihan multimedia adalah (Heinich et al., 1996):
i. Membolehkan penyampaian sesuatu maklumat menjadi lebih efektif hasil
daripada penggunaan pelbagai media.
ii. Elemen-elemen multimedia menyokong penggunaan pelbagai sensor (multi-
sensory) serta mampu merangsangkan penggunaan pelbagai deria manusia.
iii. Menyokong pembelajaran yang bersifat penyelesaian masalah, membentuk dan
menguji hipotesis, penilaian berasakan keupayaan serta meningkatkan kreativiti
pelajar.
iv. Multimedia interaktif terbukti berkesan dalam membentuk serta mengekalkan
maklumat untuk tempoh masa yang panjang dan boleh dicapai kembali dengan
pantas berbanding kaedah pengajaran tradisi.
v. Menarik minat pelajar supaya mereka tidak merasa bosan dan dapat memberi
tumpuan yang sepenuhnya terhadap proses P&P
Oleh itu, bertepatan dengan cadangan penyelidikan iaitu membangunkan eTLM diharap
penggunaan teknologi multimedia dapat menyokong dan mempermudahkan proses P&P
Tajwid dengan menggabungkan kaedah semantik di dalam perlaksanaan eTLM.
5. Semantik
Secara umumnya, semantik ialah satu bidang yang terdapat dalam ilmu linguistik yang
mengkaji tentang makna sesuatu perkataan, frasa, ayat dan ujaran (Adenan, 2007). Istilah
semantik berasal daripada perkataan Yunani kuno iaitu sema yang bermaksud isyarat.
Perkataan sema akan menerbitkan kata semainein yang bermaksud bererti. Kemudian
semainein diinggeriskan menjadi semantik, dan dalam bahasa Melayu menjadi semantik.
Orang pertama yang menggunakan perkataan semantik ialah M. Breal, 1900 (Adenan, 2007).
Dari segi istilah pula, semantik merujuk kepada sistem dan kajian tentang makna dalam
bahasa (Kamus Linguistik, 1997). Oleh itu, semantik boleh dikatakan satu ilmu yang
membincangkan tentang makna sesuatu perkataan.
Matlamat utama penyelidikan ini, adalah untuk menunjukkan bagaimana, semantik dalam
Ilmu Tajwid dapat diteliti dari aspek huraian makna setiap hukum Tajwid dengan lebih
terperinci. Semantik dalam konteks Ilmu Tajwid adalah memberi penerangan makna kepada
setiap hukum-hukum Tajwid yang terlibat dalam pembangunan eTLM. Setiap hukum Tajwid
akan diterangkan dengan terperinci dan mendalam dengan menyediakan contoh-contoh yang
berkaitan dengan hukum Tajwid tersebut. Contohnya hukum Mad Asli, semantik akan
memainkan peranannya dalam mendefinisikan maksud hukum tersebut dan seterusnya akan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 92
memberi contoh hukum tersebut. Contoh medan makna Tajwid diterjemahkan dalam bentuk
gambarajah. Rajah 1 dibawah menunjukkan contoh medan makna bagi Tajwid.
Rajah 1: Contoh medan makna bagi Tajwid
6. Kaedah Penyelidikan/Metodologi
Terdapat lima fasa utama untuk melaksanakan eTLM. Langkah-langkah proses tersebut
adalah seperti yang ditunjukkan dalam Rajah 2 di bawah.
Rajah 2: Fasa Penyelidikan eTLM
Proses metodologi ini bermula dengan kajian secara teori dan pengumpulan maklumat,
kemudian disusuli dengan langkah kedua iaitu pembangunan model, seterusnya ialah
rekabentuk prototaip berdasarkan model yang dibangunkan, pembangunan prototaip dan
proses terakhir ialah penilaian prototaip. Jadual 2 menunjukkan langkah-langkah, teknik dan
hasil setiap fasa.
Kajian Secara Teori dan Pengumpulan Maklumat
Analisis
Rekabentuk Prototaip Berdasarkan Model yang
dibangunkan
Pembangunan Prototaip
Penilaian Prototaip
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 93
Jadual 2: Langkah-langkah, teknik dan hasil setiap fasa
Fasa Langkah-langkah Teknik Hasil
Kajian secara teori
dan pengumpulan
maklumat
Bangunkan
perancangan kerja
- Mengenalpasti
tugas-tugas
- Carta gantt
- Perancangan kerja
Mengkaji kajian
sedia ada berkenaan
dengan e-
pembelajaran,
semantik dan
multimedia
- Kajian sedia ada
dikaji
- Dapatan hasil
kajian sedia ada
seperti kelebihan,
kekangan,
persamaan dan
perbezaan.
Analisis Analisis - Analisis masalah - Perancangan
analisis
Pengumpulan
maklumat
- Temuduga
- Soal selidik
- Maklumat
Pemodelan use case
- Use case
- Model use case
- Model fungsi
Konseptual model - Konseptual model
eTLM
- Konseptual
Model eTLM
Rekabentuk
Prototaip
Berdasarkan Model
yang dibangunkan
Rekabentuk
kandungan
- Kandungan
Tajwid
- Kandungan
Tajwid
Rekabentuk papan
cerita
- Papan cerita - Papan cerita
Rekabentuk
prototaip
- Prototaip - Prototaip
Rekabentuk
antaramuka
- Carta struktur
antaramuka
- Rekabentuk
antaramuka
Pembangunan
Prototaip
Aturcara - Aturcara
dibagunkan
- Aturcara
Penilaian Prototaip Pengujian pakar - Pengujian
heuristic
- Hasil pengujian
6.1 Fasa 1: Kajian secara teori dan pengumpulan maklumat
Pelbagai kajian sedia ada yang berkaitan dengan e-pembelajaran, semantik dan multimedia
dalam persekitaran pembelajaran akan dimasukkan sebagai rujukan daripada jurnal, buku dan
kajian akademik yang lain. Pengumpulan maklumat amat penting kerana melibatkan analisis
keperluan daripada sasaran pengguna.
6.2 Fasa 2: Analisis
Fasa analisis menumpukan kepada sasaran pengguna yang akan menggunakan aplikasi ini.
Fasa ini akan mengaplikasikan proses SQIRO iaitu sampling, questionnaires, reading and
observation yang diambil daripada Haslina, Azizah, Azida dan Azlin (2002). Temuduga
adalah teknik yang digunakan untuk memahami dan dapat membantu untuk mengetahui
keperluan pengguna untuk membangunkan eTLM. Temuduga tidak berstruktur akan
digunakan bagi membangunankan eTLM. Temuduga telah dijalankan di lima buah sekolah
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 94
rendah di daerah Kubang Pasu dimana melibatkan seramai lima orang responden iaitu guru
Pendidikan Islam.
Dalam fasa ini juga, model gambarajah use case dibangunkan. Model Gambarajah uise case
menunjukkan interaksi antara pengguna iaitu guru/pelajar dengan aplikasi Tajwid. Pengguna
boleh berinteraksi dengan aplikasi dengan memilih fungsi-fungsi yang terdapat di dalam
aplikasi ini seperti pengenalan, makhraj huruf, menganal baris hukum-hukum Tajwid dan
carian. Use case digunakan bagi menentukan keperluan kefungsian bagi aplikasi yang
dicadangkan. Rajah 3 menunjukkan gambarajah use case pembangunan eTLM.
Rajah 3: Model gambarajah use case eTLM
Manakala, model konseptual bagi pembangunan eTLM turut direkabentuk. Model konseptual
eTLM telah direkabentuk bagi memudahkan proses P&P Tajwid. Rajah 4 menunjukkan
aliran proses P&P Tajwid dalam perlaksanaannya. Model konseptual eTLM mengandungi
dua bahagian iaitu Tajwid dan proses penilaian dan pengukuhan.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 95
Rajah 4: Model konseptual eTLM
6.3 Fasa 3: Rekabentuk prototaip berasaskan model yang telah dibangunkan
Rekabentuk prototaip memerlukan proses dan model papan cerita untuk proses pembangunan
prototaip eTLM. Melalui papan cerita pengguna boleh melihat apakah hasil yang akan
diperolehi daripada eTLM. Perisian yang akan digunakan bagi membangunkan eTLM ialah
perisisan adobe flash.
6.4 Fasa 4: Pembangunan Prototaip
Pembangunan prototaip eTLM melalui aturcara dan rekabentuk kandungan secara maya
berasaskan rekabentuk prototaip yang telah dibuat akan dibangunkan dalam fasa ini. Hasil
TEORI KOGNITIF PEMBELAJARAN MULTIMEDIA MAYER (Sumber: Mayer & Moreno, 2001)
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 96
daripada prototaip ini akan dipersembahkan kepada pengguna dan segala cadangan daripada
pengguna akan dianalisis semula untuk penambah baikan prototaip eTLM.
6.5 Fasa 5: Penilaian Prototaip
Akhir sekali fasa ini memfokuskan kepada pengujian kebolehgunaan dan keberkesanan
prototaip eTLM yang telah dibangunkan. Fasa ini akan menggunakan penilaian heuristic oleh
Jacob Nielsen (2005) sebagai garis panduan untuk menilai prototaip eTLM (Nielsen, 2005).
7. Kesimpulan
Perkembangan teknologi pada masa kini berkembang dengan pesat dalam pelbagai bidang
khususnya dalam pendidikan. Perkembangan teknologi dalam pendidikan turut memberi
impak dalam pendidikan Al-Quran khususnya Tajwid di kalangan umat Islam. Dengan
pembangunan model eTLM, di harap dapat membantu menjadikan proses P&P Tajwid lebih
menyeronokkan malah mampu menangani pelbagai limitasi P&P Tajwid akibat gaya hidup
masyarakat yang berubah. Justeru, dengan menggabungkan e-pembelajaran, semantik dan
elemen multimedia membolehkan model eTLM yang dicadangkan ini lebih dinamik.
Rujukan
Abdullah al-Qabbani bin Hj. Salleh. (1990). Kursus Qari dan Qariah, Kota Bharu: Pustaka
Aman Press Sdn. Bhd. h. 17.
Adenan bin Ayob. (2007). HBML3803: Ilmu Makna dan Bahasa Melayu: Open Universiti
Malaysia; Kuala Lumpur.
Ahmad Mahmood Musanif. Ph.D. (2004). Modul Pembelajaran: BBM 3206 Semantik:
Universiti Putra Malaysia; Selangor Darul Ehsan.
Al-Azahari. (1998). Tajwid Al-Quran Rasm Uthmani, Kuala Lumpur: Pustaka Salam. h 23.
Bashir, S.F. Rasheed, M.M. Awais, S. Masud, S.Shamail (2003). Simulation of Arabic
Phoneme Identification through Spectrographic Analysis. Department of Computer
Science LUMS, Lahore Pakistan.
Drucker, P. (2000). Need to Know: Integrating e-Learning with High Velocity Value Chains.
A Delphi Group White Paper. Dicapai pada 1 Mei 2009 daripada
http://www.delphigroup.com/pubs/whitepapers/20001213-e-learning-wp.pdf
Feldman, T. (1997). An introduction to digital media. Routledge: London.
Glosari Al-Quran. (1992). Kuala Lumpur. Dewan Bahasa dan Pustaka.
Haji Mohd Isa bin Abd. Razak. (2003). KDPM Mod Latihan Pengurusan Berasaskan
Sekolah: Pengajian Melayu; Bahagian Pendidikan Guru.
Haslina Mohd, Azizah Ahmad, Azida Zainol & Azlin Nordin. (2000). Analisis dan
Rekabentuk Sistem. Prentice Hall.
Heinich, R., Molenda, Russel, Smaldino (1996). Instructional media and technology. Edisi
Kelima. New Jersey: Prentice Hall.
Hofstetter, F.T. (1995). Multimedia Literacy. New York: McGraw Hill.
Jamalludin Harun & Zaidatun Tasir. (2003). Multimedia dalam Pendidikan, PTS
Publications: Bentong. Dicapai pada 16 November 2009 daripada http://www.jz-
media.com
Jonassen, D. H., Davidson, M., Dollins, M., Campbell, J. & Bannan Haag, B. (1995).
Constructivism and computer-mediated communication in distance education. The
American Journal of Distance Education 9(2):7-15.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 97
Kaplan-Leiserson, E. (2000). E-learning glossary. Dicapai pada 17 Jun 2009 daripada
http://www.learningcircuits.org/glossary.html.
Logan. D. (2001). E-learning in the knowledge age. Gartner Symposium Itxpo 2001. 30 July
1 August 2001, Johannesburg, South Africa.
Maurer, H., & Sapper, M. (2001). E-Learning Has to be Seen as Part of General Knowledge
Management, In Proc. of ED-MEDIA 2001 World Conference on Educational
Multimedia, Hypermedia and Telecommunications, pp. 1249-1253.
Norashikin Fabil. (2002). Pembangunan Perisian Kursus Tajwid: Pendekatan Talaqqi dan
Musyafahah. Tesis Sarjana Teknologi Maklumat. Universiti Kebangsaan Malaysia. h.
30.
OConnor, C., Sceiford, E., Wang, G., Fourcar, Scocki, D., & Griffin, O. (2003). Departure,
bandonmment, and dropout of e-learning: Dilemma and Solutions. Dicapai pada 16
November 2009, daripada www.masie.com
Rosenberg, M. J. (2001). New York: McGraw-Hill. E-learning: strategies for delivering
knowledge in the digital age.
Taylor D.R. (2002). E-learning: the second wave. Learning Circuits: ASTDs online
magazine. October 2002. Dicapai pada 12 Jun 2009 daripada
http:www.learningcircuits.com
Wahyu binti Idrus & Yahya Isa. (2001). Aplikasi E-Learning Dalam Pengajaran &
Pembelajaran Di Sekolah-Sekolah Malaysia: isu dan cadangan perlaksanaannya.
Zarina Shukur et al. (1999). Pengajian Tajwid Al-Quran Berbantukan Multimedia dlm
Prosiding Seminar Kebangsaan Dalam Pengajaran Dan Pembelajaran: Stategi
Pengajaran dan Pembelajaran di Abad 21. h 237.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 98
NEXT CHALLENGE: VALUES, COMMUNITY DEVELOPMENT AND
SUPERINTELLIGENCE
Ali Akbar Ziaee
The International Institute of Islamic Thought and Civilization (ISTAC)
aaziaee@hotmail.com
Abstract
Artificial Intelligence has the potential to empower humans through enhanced learning and
performance. But if this potential is to be realized and accepted the social and ethical aspects
as well as the technical must be addressed. Superintelligence will be smarter than the best
human brains in practically every field, including scientific creativity, general wisdom and
social skills. So we must consider it as an important factor in making decisions in our social
life and especially in community development. There are some writers who neglect the
positive role of Superintelligence to this process because of powerful private sector interests,
but I think we should be optimist and change our ideas about new generation of Robots. We
can teach them the human values and create friendly artificial intelligence which will develop
our community in the next decades. The most important problem will be the quality of
representing the human values like freedom, liberality, tolerance, faith, certainty, and etc in
the form of semantics.
Keywords: Community Development, Artificial Intelligence, Superintelligence, Friendly
Artificial Intelligence,
I. INTRODUCTION
rtificial Intelligence is all around us. Intelligent agents are widely used. The physical
embodiment of agents, robots, is also becoming more widely used. Robots are used to
explore the oceans and other worlds, being able to travel in environments inhospitable
to humans. It is still not the case, as was once predicted, that robots are widely used by
households. Expert systems are used by doctors to help with symptoms that are hard to
diagnose or to prescribe treatments in cases where even human experts have difficulty.
Artificial Intelligence Systems are used in a wide range of industries, from helping travel
agents to select suitable holidays to enabling factories to schedule machines. Artificial
Intelligence is particularly useful in situation where traditional methods would be too slow.
Combinatorial problems, such as scheduling teachers and pupils to classrooms, are not well
solved by traditional computer science techniques. Many computer games have been
designed based on Artificial Intelligence. It is likely that Artificial Intelligence will become
more prevalent in our society. And whether or not we eventually create an Artificial
Intelligence that is truly intelligent, we are likely to find computers, machines, and other
objects appearing to become more intelligent- at least in terms of the way they behave [1].
The high position of humans creature in the world constitutes one of the religious
thoughts bases. If human creates Superintelligence in the future, our belief to that reality will
not change, because we consider Superintelligence as an effect of human mind and creativity
and the law of causality proves that the existence of effect depends on the cause, so I believe
A
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 99
that Superintelligence will not damage our life as we see in Hollywood films, but the values
of human which organize our better intellectual life must be programmed in
Superintelligence, and with this approach we can solve the challenge between community
development and Superintelligence, we can call it Friendly Artificial Intelligence.
II. NOTION OF COMMUNITY DEVELOPMENT
Despite of widely usage of this broad term we can see large variety of concepts about it.
Most people use it for constructional activities and their measurement about development is
not far away from the altitude of buildings, their luxuries, quality of roads and etc. We can
name this concept as constructive development. The others maybe consider the development
as the improvement in these fields: quality of education, number of schools, universities,
academies, and scientific centers. We can call this kind of development as scientific
development. There are many applications and usages for this term in our conversations like
economic development which depends on level of investments, and increasing the number of
factories, or political development which depends on plurality of parties, newspapers, and
many other things. This term applied to the practices and academic disciplines of civic
leaders, activists, involved citizens and professionals to improve various aspects of local
communities. Community development seeks to empower individuals and groups of people
by providing these groups with the skills they need to effect change in their own
communities. A defining feature of community development is that the work proceeds from
the perspectives and interests of communities themselves, with an overall goal of the
establishment of sustainable capacity and infrastructure to support on-going and future
activities and engagement. Community development aims to re-shape relationships within
and between communities and organizations, so as to strengthen the foundations for
collective action and partnership working. This includes changing power relations as well as
extending the reach of social networks [2].
Three important elements were identified [3]:
A concern with social and economic development.
The fostering and capacity of local co-operation and self-help.
The use of expertise and methods drawn from outside the local community.
Within this there does appear to be a certain contradiction. Community development
emphasizes participation, initiative and self help by local communities but is usually
sponsored by national governments as part of a national plan. While from one side it can be
seen as the encouragement of local initiative and decision making, from the other it is a
means of implementing and expediting national policies at the local level and is a substitute
for, or the beginning of, local government [4].
The focus on the social and economic, local and global also helps to situate debates about
community development - and the disillusionment with its achievements that was widespread
in many Southern countries by the 1970s. Many governments, particularly in Africa, failed to
provide adequate financial support but nevertheless extolled the virtues of self-help.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 100
Community development was soon recognized by the people to amount to little more than a
slogan which brought few tangible benefits [5].
Community Development. Community development was seen as emphasizing self-help,
mutual support, the building up of neighborhood integration, the development of
neighborhood capacities for problem-solving and self-representation, and the promotion of
collective action to bring a community's preferences to the attention of political decision-
makers.
Community developers must understand both how to work with individuals and how to
affect communities' positions within the context of larger social institutions. The process of
developing active and sustainable communities is based on social justice and mutual respect.
It is about influencing power structures to remove the barriers that prevent people from
participating in the issues that affect their lives. Community workers (officers) facilitate the
participation of people in this process. They enable connections to be made between
communities and with the development of wider policies and programs. Community
Development expresses values of fairness, equality, accountability, opportunity, choice,
participation, mutuality, reciprocity and continuous learning. Educating, enabling and
empowering are at the core of Community Development. I think that community
development is conscious social activity that contains the spiritual and material life of the
society. We must give the high consideration to the role of human values, spiritual aspect of
human being and his cultural and educational inquiries, and to the role of experts and
community workers and politic leaders or officers in the community development. This chart
illustrates the relationship between these elements:
Values
Community Development
Many things are said about community development and there is no need to mention them
here. I want to emphasize on two important elements in my paper in this conference:
community development and Artificial Intelligence, community development and values.
What are Artificial Intelligence, friendly AI, and Superintelligence? John McCarthy
defines it as making intelligent machines especially intelligent computer programs through
science and engineering. It is related to the similar task of using computers to understand
Experts
Society
Superintelligence
Society
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 101
human intelligence, but AI does not have to confine itself to methods that are biologically
observable.
i
Artificial Intelligence (AI) is the area of computer science focusing on creating
machines that can engage on behaviors that humans consider intelligent. Intelligent agents
can plan and adapt plans to respond to changes in circumstances; they can recognize what is
significant in a situation; they can learn new concepts from old; they can interact and learn
from their environment; they can exercise aesthetic appreciation.
ii
The ability to create
intelligent machines has intrigued humans since ancient times and today with the advent of
the computer and 50 years of research into AI programming techniques, the dream of smart
machines is becoming a reality. Researchers are creating systems which can mimic human
thought, understand speech, beat the best human chess player, and countless other feats never
before possible. Find out how the military is applying AI logic to its hi-tech systems, and how
in the near future Artificial Intelligence may impact our lives. Artificial Intelligence, or AI for
short, is a combination of computer science, physiology, and philosophy. AI is a broad topic,
consisting of different fields, from machine vision to expert systems. The element that the
fields of AI have in common is the creation of machines that can "think". In order to classify
machines as "thinking", it is necessary to define intelligence. To what degree does
intelligence consist of, for example, solving complex problems, or making generalizations
and relationships? And what about perception and comprehension? Research into the areas of
learning, of language, and of sensory perception have aided scientists in building intelligent
machines. One of the most challenging approaches facing by experts is building systems that
mimic the behavior of human brain, made up of billions of neurons, and arguably the most
complex matter in the universe. Perhaps the best way to gauge the intelligence of a machine
is British computer scientist Alan Turing's test. He stated that a computer would deserve to be
called intelligent if it could deceive a human into believing that it was human. Artificial
Intelligence has come a long way from its early roots, driven by dedicated researchers. The
beginnings of AI reach back before electronics, to philosophers and mathematicians such as
Boole and others theorizing on principles that were used as the foundation of AI Logic. AI
really began to intrigue researchers with the invention of the computer in 1943. The
technology was finally available, or so it seemed, to simulate intelligent behavior. Over the
next four decades, despite many stumbling blocks, AI has grown from a dozen researchers, to
thousands of engineers and specialists; and from programs capable of playing checkers, to
systems designed to diagnose disease. AI has always been on the pioneering end of computer
science. Advanced-level computer languages, as well as computer interfaces and word-
processors owe their existence to the research into Artificial Intelligence. The theory and
insights brought about by AI research will set the trend in the future of computing. The
products available today are only bits and pieces of what are soon to follow, but they are a
movement towards the future of Artificial Intelligence. The advancements in the quest for
Artificial Intelligence have, and will continue to affect our jobs, our education, and our lives.
By a "Superintelligence" we mean an intellect that is much smarter than the best human
brains in practically every field, including scientific creativity, general wisdom and social
skills. This definition leaves open how the Superintelligence is implemented: it could be a
digital computer, an ensemble of networked computers, cultured cortical tissue or what have
you. It also leaves open whether the Superintelligence is conscious and has subjective
experiences [8].
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 102
III. COMMUNITY DEVELOPMENT AND SUPERINTELLIGENCE
Expert means a person who has special skill or knowledge in some particular field. In this
century the information is a main power in society, and the experts who own this opportunity
can influence the society, and I think in the future instead of human experts we will face the
expert system in Artificial Intelligence technology. It will be our challenge in future and I
think we must give a high consideration to this problem for the next decades. The new
generation of computers will be able to do millions operations at a moment. Most AI work
today does not require any philosophy, because the system being developed does not have to
operate independently in the world and have a view of the world. The designer of the
program does the philosophy in advance and builds a restricted representation into the
program. We have been studying this issue of AI application for quite some time now and
know all the terms and facts. But what we all really need to know is how we can represent
human values in a formal manner. One conclusion from artificial intelligence research is that
solving even apparently simple problems usually requires lots of knowledge. Proper
understanding of a single sentence requires extensive knowledge both of language and of the
context. How can we as programmers represent the concept of fairness -in the human life as
an important base for community development - in meaningful way for Superintelligence.
Consider what someone from another planet would make of a typical newspaper headline,
knowing nothing of Earth politics and practices, and armed only with an English dictionary!
Properly understanding a visual scene similarly requires knowledge of the kinds of objects
that might appear in the scene. Solving problems in a particular domain generally requires
knowledge of the objects in the domain and knowledge of how to reason in that domain-both
these types of knowledge must be represented. To represent knowledge in a meaning way it is
important that we can relate facts in a formal representation scheme to facts in the real world.
The semantics of a representational language provides a way of mapping between expression
in a formal language and the real world [9].
Knowledge of development is information about better social life for human and we can
describe these terms and conditions by their properties. There are many ways to represent
objects. These objects concern to development are complex objects and a complex object
may be composed of many other objects. This is a kind of reductionism. The reductionism
position is that the complex behavior of the mind may in principle be reduced to similar rules
and laws which may be complex but which can be investigated and understood [10]. Cultural
development, economic development, scientific development, and finally community
development depend on many wide areas of human knowledge and values which are
accepted by all human beings and they will be presented in formal ways to be known by
Superintelligence and these new creations will influence on our life.
We should be prepared for a change. Our conservative ways stand in the way of progress.
AI is a new step that is very helpful to the society and its development. Machines can do jobs
that require detailed instructions followed and mental alertness. AI with its learning
capabilities can accomplish those tasks but only if the worlds conservatives are ready to
change and allow this to be a possibility. I am not worry about how we can construct this
powerful program which will be smarter than the best human brain, but I am worry about
how we lead them to human values. I am worry about the worst of AI. There are so many
things that can go wrong with a new system, so we must be as prepared as we can for this
new technology. AIs are like children that need to be taught to be kind, well mannered, and
intelligent. If they are to make important decisions, they should be wise. We as citizens need
to make sure AI programmers are keeping things on the level. We should be sure they are
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 103
doing the job correctly, so that no future accidents occur. AI is what Nick Bostrom calls an
existential risk: "One where an adverse outcome would either annihilate Earth-originating
intelligent life or permanently and drastically curtail its potential." In particular, most forms
of unfriendly AI would constitute a "Bang"-"Earth-originating intelligent life goes extinct in
relatively sudden disaster resulting from either an accident or a deliberate act of destruction."
Within Nick Bostrom's list of Bangs, sorted by probability, "badly programmed
Superintelligence" is number four out of eleven [11].
Artificial Intelligence, as an ultra technology, does not exist in isolation. There are other
kinds of advancing technologies; nanotechnology, biotechnology, and nuclear technology, for
example. Artificial Intelligence is unique among the ultra technologies in that it can be given
a conscience, and in that successful development of Friendly AI will assist us in handling any
future problems. A "Friendly AI" is an AI that takes actions that is, on the whole, beneficial
to humans and humanity. In a "~human" scenario ("near human", "approximately human-
equivalent"), Friendly AIs would play ~human roles in the existing human economy or
society. To the extent that Friendly AIs have power in the world economy, in human society,
or in technological development, they can exert direct influence for good. For example, a
Friendly AI working in nanotechnology can enthusiastically work on Immunity systems
while flatly refusing to develop nanotechnological weaponry. The presence of Friendly AIs
within a society -as an interest group with influence- will tend to influence that society
towards altruism.
- The presence of a Friendly AI within a political discussion - as a voice advocating a
viewpoint - will tend to influence that discussion towards lack of bias. This holds
especially true insofar if Friendly AIs have previously gained respect as fair, truthful,
unbiased voices.
- The presence of a Friendly AI within a political power structure - as a decision-maker
- will lead to altruistic decisions being made. This holds especially true insofar if
decisions which humans keep screwing up due to personal bias tend to get handed off
to a Friendly AI.
- The presence of a Friendly AI within a technological development process -as a
researcher- will tend to accelerate defensive applications and economic applications
ahead of offensive applications, and largely beneficial technologies ahead of more
ambiguous ones [12].
The requirements for FAI to be effective, both internally, to protect humanity against
unintended consequences of the AI in question and externally to protect against other non-
FAIs arising from whatever source are:
- Friendliness: that an AI feel sympathetic towards community development in future,
and seek for their best interests Conservation of Friendliness - that an AI must desire
to pass on its value system to all of its offspring and inculcate its values into others of
its kind.
- Intelligence: that an AI is smart enough to see how it might engage in altruistic
behavior to the greatest degree of equality, so that it is not kind to some but crueler to
others as a consequence, and to balance interests effectively.
- Self-improvement: that an AI feel a sense of longing and striving for improvement
both of itself and of all life as part of the consideration of wealth, while respecting and
sympathizing with the informed choices of lesser intellects not to improve themselves.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 104
But there are authors [13] who consider the theory of Friendly AI is incomplete. They
believe that there should be broader political involvement in the design of AI and AI
morality and this will have a bad influence on community development. They also
believe that initially AI seed could only be created by powerful private sector
interests.
IV: CONCLUSION
If human create Superintelligence in the future - and I think it will be possible, because in
this moment we can produce Distributed Artificial Intelligence which can process faster than
human brain- our belief to that reality will not change, because we consider Superintelligence
as an effect of human mind and creativity and the law of causality proves that the existence of
effect depends on the cause, so I believe that Superintelligence will not damage our life as we
see in Hollywood films, but the values of human which organize our better intellectual life
must be programmed in Superintelligence, and with this approach we can solve the challenge
between Community Development and Superintelligence, we can call it friendly Artificial
Intelligence.
Distributed Artificial Intelligence is concerned with the cooperative solution of problems by
a decentralized group of agents. The agents may range from simple processing elements to
complex entities exhibiting rational behavior [14]. There are so many things that can go
wrong with a new system so we must be as prepared as we can be for this new technology.
AIs are like children that need to be taught to be kind, well mannered, and intelligent.
REFRENCES:
[1] Ben Coppen, Artificial Intelligence illuminated, London, Jones And Bartelett Publication,
2004, pp. 23-24.
[2] Based on the SCCD Strategic Framework, the National Occupational Standards for CD
work, and the latest draft of CDXs Information Sheet: What is community development.
[3] Midgley, J. with Hall, A., Hardiman, M. and Narine, D. (1986), Community Participation,
Social Development and the State, London: Methuen, p. 18.
[4] Jones, D. (1977), 'Community Work in the UK' in H. Specht and A. Vickery (eds.)
Integrating Social Work Methods, London: George Allen and Unwin.
[5] Midgley,p 18.
[6] John McCarthy, WHAT IS ARTIFICIAL INTELLIGENCE?, Computer Science
Department, Stanford University Stanford, CA 94305.
[7] Janet Finaly & Alan Dix, Artificial Intelligence, UCL Press, 1996, p. 262
[8] Nick Bostrom, HOW LONG BEFORE SUPERINTELLIGENCE? in International.
Journal. of Future Studies, 1998, vol. 2.
[9] Alison Cawsey, The essence of Artificial Intelligence, England, Prentice Hall, 1998, p. 3.
[10] Morris W. Firebaugh, Artificial Intelligence, A Knowledge based Approach, Boston,
PWS-Kent Publishing Company, 1988, p.14.
[11] Nick Bostrom, Existential Risks: Analyzing Human Extinction Scenarios and Related
Hazards, in Journal of Evolution and Technology, Vol. 9, March 2002. First version.
[12] Ibid.
[13] Bill Hibbard, Super-Intelligent Machines, New York. Kluwer Academic/Plenum
Publishers. 2002; Hibbard, W. Super-intelligent machines. Computer Graphics 35(1), 11-
13. 2001.
[14] Michael N. Hohns, Distributed Artificial Intelligence, London, Morgan Kaufmann, 1987
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 105
MODELLING IDIAS-INTERACTIVE DIGITAL INSTRUCTION AND
ASSESSMENT SYSTEM THROUGH THE ICONIZATION OF LEARNING IN
TEACHING ISLAMIC HISTORY
Maulawi L. Calimba
Islamic Studies Department, Mindanao State University,
Fatima Campus, General Santos City, 9500 Philippines
maulawi@yahoo.com
Abstract
The teaching-learning modalities is in flux as challenges and gaps brought about by advances
in digital technologies. The project proposed, IDIAS (Interactive Digital Instruction and
Assessment System), could be one of the initiative for curriculum and pedagogical innovation
in a developing country like Philippines. It is suggested that the proposal is an aid towards
online learning while still in a state of chalk-board era. The project aimed advocacy is to
optimize the use digital technology in the classroom environment through proposed IDIAS
and through the aid of users friendly courseware. Through Iconization as a teaching-learning
and assessment method, samples of relio-cultural materials, personalities, places, symbols,
emblems, images, words, audio ( indigenous musical sounds and instruments ) or any thing
of historical significance, that can represent as a digital icon of particular event in Islamic
history. And or build icons through learners contruct or choice to emphasize learning
objective. The project is proposed as a trasformative initiative, organizationally, and in
teaching-learning-evaluation process.
The modalities of teaching-learning of Islamic history is accentuated as classroom
environment, new technologies, new learning style of digitally literate students and the net
that challenges the traditional teaching style. The paper which was largely developed from
the Authors Masters Research Project as Graduate student from University Southern
Queensland, Toowoomba, QLD, Australia. The paper aimed to proposed the IDIAS and
Iconization of Learning as a curriculum and pedagogical transformation initiative in teaching
Islamic History or perhaps enhancing Muslim education particularly in a third world setting.
It explores its theoritical foundation by revisiting literatures available to provide further
academic validity of the concept as a teaching-learning theory and evaluation method.
INTRODUCTION
To begin with, let me qoute few verses in the Holy Quran:
(competition)
The 21
st
century is the era that human civilization have faced enormous challenges to
change. The main factor causing irresistible force to change is globalization (economic and
political integration), new technology, giant leap in information system that facilitate world
interconnectedness, the ecological responsibility and interdependence were commonly cited
in literatures e.g. (Nankervis, 2008; Schuller et. al.,1996; Diggins, 1997, Drucker, 1994).
Diggins (1997, p. 418) observed that school system are structurally ineffective amidst the
immense transformation of educational system taking place worldwide. The challenges on
education is confluenced by intertwined factors of : the changing learners demographic
profile, the key role of universities, budget cut of government support to tertiary institution,
and the advancement of information technology. A phenomenon globally observed in many
countries by educators like Terenzini and Pascarella, (1998), Elliot (1995), Rita Kop (2008)
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 106
Diggins (1997), Drucker (1994) and many more scholars that literatures and the googling the
net will give more names recognizing these challenges. The impact to the educational
institution is holistic ranging from change in its philosophy, organizational structure, role of
teachers, classroom environment, educational theory and practice, and to curriculum
development. For example, the teaching-learning modalities are in flux as digital
technologies advances. Siemens (2006, p. 3) observed that traditional views of learning
have been questioned and accentuated with the development of the internet. He further
confirmed two years after that the current developments in educational technology and social
software were significantly altering: (a) how learners access information and knowledge, and
(b) how learners dialogue with the instructor and each other (Siemens, 2008, p.1). He was
indeed precise in predicting that educators will be weary of pedagogy and curriculum before
it can address the change needed (Siemen, 2006). Online education, educational software
(e.g. easily speaking dragon), multimedia aided instruction and evaluation (e.g Eureka
Software), stress relieving learning tools like mouse pen (e.g. livescribe and bamboo pen),
electronic library resource materials and the globalization of academic standard were
irresistable and exacerbating these trends. Similarly, the net generation are entering higher
education with expectations sure to be unmet because these learners are digitally literate,
constantly connected, socially-driven, engaged, visually-driven, and a host of additional
pronounced characteristics (Siemens, 2008, p. 33-34). Rita Kop (2008) similarly made the
same observation and noted that as the shift from tutor to autonomous learning style is
becoming prevalent. She put emphasis on the need to use information technology in the
schools to address the desperate learners appetite in the net as the current educational system
failed their expectation. It is also worth mentioning that as a whole, our structures of
learning have become more utilitarian, and career driven with the desire to achieve and
produce in an economic system (Siemen, 2006, p.7).
The dawn of 21th century corresponds to the 14
th
century Hijrah which was dubbed as
Islamic Resurgence in most literatures (Calimba, 1990). There are several issues affecting
Muslim communities from Morocco to Manila which can be categorized into dominant
historical themes ranging from political to religio-culturally revisiting past prowess and
assertive on the rediscovered role in the modern world. The Muslim communities response
to these challenges varies from politically radical to intellectual or academic approach. But
how this phenomenon does affect the Muslim society particularly the Madrasah and the
teaching-learning of Islam. The net is far more serious as it creates a mouse click boundary
between halal and haraam information, however in a positive note, it provides an opportunity
for wireless propagating Islam and the ummah is more interconnected than ever before. For
example, the electronic Quran and Hadith digitally encrypted in computers and mobile
phones, and can be accessed anytime and anywhere but Shariah compliant users guide have
not been properly disseminated for its perusal.
By taking seriously the aformentioned observations, one has to tinker where are these
current models of education taking us?. What future generation will be made up to assuming
that this trend of learning will be prevalent?. How do these educational aproaches shape the
future of human civilization?. Though uncertainties projected ahead, hope for the best is
expected as educators are restless and endless in their effort to offer innovative designs to
improve the teaching and learning environment. As Postman (1995, cited by Simon, 2004, p.
7) have succinctly noted that teachers, nowadays, are known not only in providing reasons for
learning but also in inventing a method. Alternative medium of instruction comes as the
phase of unpredictable changes challenges the present. This because Siemen (2004) observed
that in the past decades, learning has changed tremendously and that even known learning
theories like behaviourism, cognitivism, and constructivism fall short in a technology based
learning environment.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 107
Henceforth, it is humbly advocated in this paper to promote the Multi-Media
Instruction and Evaluation System in enhancing Muslim education in particular the teaching-
learning of Islam like Muslim history. The object of contention is modelling a manageable
prototype of the said proposal.
The primary research focus of this paper is to investigate pedagogical issues relating
to the theoretical basis of IDIAS and to explore its potentials as an initiative of instiutional
transformation. Thus discover its potential benefits, limitations, oppurtunities, and challenges
in initiating curriculum innovation in relation to the state of instruction in Muslim educational
institution.
Objective
The main objective of the research project is to introduce IDIAS as an alternative
medium of instruction and to explore issues associated with pedagogical design in teaching,
learning and assessment, its theoretical foundation and its adaptability. As an organizational
transformation initiative, it explores the conceptual framing, perceptual acceptability and the
means or process of its implementation. Simply it attempt to introduce the adaptability of the
proposal and possible projection on the advantages and disadvantages that will be considered.
A theoretical foundation has been similarly discussed to validate iconization as a teaching-
learning approach, and perhaps, as an assessment tool and technique. Hopefully, to further
explore whether iconization will constitute as a learning theory and or teaching method or
aid.
Relevance
The state of instruction in Madrasah in the Philippines is still basically in the
blackboard era and the use of multimedia technology is very minimally employed as a
teaching tool aide, not to mention that the asatids or teachers is yet to be abreast of the
advances of digital technology and exploiting its usefulness in the academic world. Indeed,
the IDIAS is of the essence as it will be helpful in addressing the digital gap in the teaching
and learning environment. It is timely and relevant as the need for different theories of
learning and a call to rethinking or redesigning education is felt not only in advance countries
but also in developing nations like the Philippines. The proposed IDIAS and the iconization
of learning as espoused here can readily respond to the HOW of learning: how we teach,
how we design curriculum, the spaces and structures of learning, and the manner in which we
foster and direct critical and creative thought. Admittedly, the real challenge for any
learning theory is to actuate known knowledge at the point of application like the theory of
connectivism (Simon, 2004:18). Hence, this research could be a possible response to this
imperative. Another important feature of the study is that, through iconization, cultural
preservation can not only be conducted in the museums or in building monuments but also be
enlivened in the memory of the students. The continuity of the past to the present signifies the
importance of the treasured heritage that can be brought to life in this digital age.
Phases of the Project Proposal
The current project is designed to be an exploratory phase by assessing the state of
Instruction in Muslim educational institution and craft policy concerns for its transformation.
It shall consolidate the legal and shariah issues, teaching modalities and feasibility in relation
to the preaparedness of the Madrasah. The next phase is the production of modules through
team teaching and in coordination with technical expert to customize the application of the
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 108
IDIAS particularly the digital courseware that must be employed. According to Dean Caplan
(2002, p. 192), designing and developing effective instructional materials with quality
visuals, is timing consuming, needs collaborative planning of experts and the right tools in
order to maintain pedagogical standard. The final stage is the application.
LITERATURE REVIEW
The related literature that reinforced the conceptualization of the research project is
categorized along theoretical themes and as a method of teaching and evaluation. The
writings of Siemens (2004, 2005, 2006,2007, 2008) is the most valuable material reviewed
and be treated as the theoretical foundation of this project. His article entitled the
Connectivism: A Learning Theory for a Digital Age strengthen the academic validity of the
proposed IDIAS which could be considered as an implementation of the said theory.
Although connectivism is yet to earn its undisputable status as a learning theory in the
academic community, but its relevance to this research beyond reproach. Recapturing some
of its principles in the web, http://www.connectivism.ca/about.html, is enough manifestation
of its growing recognition, and as quoted below than paraphrasing, lest it might result to
distortion and be taken out of context, to wit:
- Learning constitutes the integration of cognition (thinking) and emotions.
- Learning has an end goal - namely the increased ability to "do something".
- Learning is a process of connecting specialized nodes or information sources.
- Learning may reside in non-human appliances. Learning (in the sense that something
is known, but not necessarily actuated) can rest in a community, a network, or a
database.
- The capacity to know more is more critical that what is currently known. Knowing
where to find information is more important than knowing information.
- Nurturing and maintaining connections is needed to facilitate learning.
- Learning and knowledge rest in diversity of opinions.
- Learning happens in many different ways. Courses, email, communities,
conversations, web search, email lists, reading blogs, etc.
- Different approaches and personal skills are needed to learn effectively in today's
society.
- Organizational and personal learning are integrated tasks.
- Connectivism attempts to provide an understanding of how both learners and
organizations learn.
- Currency (accurate, up-to-date knowledge) is the intent of all connectivist learning.
- Decision-making is itself a learning process.
- Learning is a knowledge creation process...not only knowledge consumption.
- Learning tools and design methodologies should seek to capitalize on this trait of
learning. (http://www.connectivism.ca/about.html).
Siemen (2006) strongly proposed that to avoid the error or misunderstanding of
connectivism, the need to explore said concept as a learning theory: static, context-less,
content-centric approaches to knowing and understanding is paramount. He was alarmed on
the danger of product iconization and review of prominent theories of learning in failing to
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 109
acknowledgeexplicitlythat ongoing changes obsolesce current knowledge (Siemen,
2006, p. 5).
The constructivist theory serves similar importance as a theoretical pillar to this
project. According to Geraldine Lefoe (1998) constructivist view learning as an active
process of constructing rather than learning acquiring knowledge and instruction is a process
of supporting that construction rather than communicating knowledge (Lefoe, 1998, as cited
in Duffy & Cunningham, 1996, p. 171). The learners knowledge is generated out of their
social interaction, personal experiences and perception of the environment. Each person has a
different interpretation and construction of knowledge process. It is worth emphasizing that
this theory advocates that students should not be told anything directly but allow freedom to
build and enhance their ability for knowledge creation. The teaching pedagogy of
constructivism is acclaimed to improve memory and attention since knowledge is built along
the learners previous knowledge, regardless of how one is taught (Retrieved 15 May, 2009
from http://www.learning-theories.com/constructivism.html).
The literature relating to teaching and evaluation, the proposal of John Allison (2007,
p. 344) explores the impact of virtual reality tools on the teaching of history and assert that
history educators at all levels must make use of the digital technology in their vocation.
Accordingly, the virtual reality tools have the potential to change teaching and learning
(Allison, 2007, p.347). However, commending his work as too advance and requires special
digital technological skills and special focus to develop which can be considered as the
ultimate objective of the IDIAS. The proposed IDIAS serves a transitional initiative in
reaching the level of application of virtual tools in teaching history. The employment of icons
is part of the content of virtual tools. Ideally, virtual reality tools is very important for
history educators and provide for effective learning experiences both in the classroom and in
the research environment (Allison, 2007, p.343). It is argued that virtual reality
technologies show great pedagogical promise for both teachers and learners as these provide
a breadth of real immersion in the historical past (Allison (2007, p.344). Indeed,
technology will change historians view of the past and reality.
In the study of C.D. Fulp and E.W. Fulp (2002) provides a more technical proposal
for interactive multimedia enhanced instruction through a wireless handheld system that
consists of hardware desktop and wireless link. The concept is very much alike to the purpose
of IDIAS except in the emphasis on iconization. The technical hardware (IPaq Server) and
the software (e.g. Microsoft PowerPoint, Adobe Acrobat, and HTML pages) used in the
system may be outdated however it claimed considerably that classroom interaction has
increased over 90% as compared to a traditional lecture environment on addressing the
problem of shy students.
The works of Terry Anderson and Fathi Elloumi (2002) expound the importance of
the attributes of media and of the modes of teaching presentations and learning mediums. The
e-book acknowledges that the challenge for teachers and course developers working in an
online learning context are to construct a learning environment that is simultaneously
learning, content, community, and assessment centred (Anderson & Elloumi, 2002, p. 54).
In Dean Caplan (2004) article, it put emphasis on the development of online courses, visual
design for electronic courses or optional electronic enhancements of print-based courses
includes the development and creation of generic or customized templates, navigational
icons, icons or images to aid recognition of location within a non-linear presentation of
materials, and visuals or graphics to enhance textual content (Anderson, & Elloumi, 2002,
p.192).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 110
Revisiting Iconization
The concept of icon or principle Iconization have been used in various academic field
such as arts, iconography, sociolinguistics, psychology, education, politics, history and by at
large computer science. Icon is a word widely used in arts before it was adopted as a
language in computer. The literatures on the concept of icon or iconization is explored to
evaluate the academic validity of the use the concept in this research project.
Iconology or iconography is a structural approach of looking at paintings at all levels
(Howells, 2003, p. 3). Or a method that help study the subject matter of work of art at each
levels. It was popularized by Erwin Panofsky of Hamburg University, Germany in 1933.
According to Howells (2003), iconology is a structural progressive and logical system for
iconological analysis that we can use for ourselves and of images of our own observational
detail in order to understand a paint or work of art but understanding a complex piece of art
considering among others, the genre of the painting, subject protrayed, central theme,
recognize the setting date, location, scene of climate, attributes (props) and cultural material.
Accordingly, what you see is what you get is not always the case. There are disguised
symboplism, codes, scales, emblems and color combination could be hidden in an art work.
In simple terms Iconology is a modicum of common sense.
In the field of linguistic and literature, iconicity is always based upon the implicit
theory of perception (Maedler, et.al., nd. p. 17). Theory of Iconicity assert the causal relation
between language and virtual perception of reality or environment that gives birth to the field
of linguistic iconicity. Though gaining theoritical ground but still ultimately based upon on
implicit theory of perception...but not without inherent weak and strong hypotheses
(Maedler, et.al.,nd., cited. Bouissau, p. 17).
In the study of Mary Antonia Andronis (2003, p. 37), she defined Iconization as a
process involves the attribution of cause and immediate necessity to a connection (between
linguistic and social groups) that may only be historical, contingent, or conventional. The
paper proves the role of iconization in its symbiotic relation between language, icons and
social identities. Accordingly, the linguistic features are then made to be (and are
subsequently interpreted as being) iconic of the identities of the speakers and labelling the
same as a type of iconization (and erasure) is pervasive in linguistic ideologies that reflect the
marginalization of other (Ibid.). The forms of the language (and frequently, the entire code)
are iconized as being low prestige. The author claimed that through the process of
iconization, the linguistic forms or features of a language are made to be iconic of the social
identities of the speakers themselves. This furthermore creates or allows for the existence of
the other (or, conversely, for the existence of one) in both indigenous and non-
indigenous contexts. How these features are iconized (and to what degree) is dependent
solely upon the prevailing ideologies of the given community.
In related study of Lionel Wee (2006) of National University of Singapore, stressed
that language ideologies play an important role in managing an ethnically and linguistically
diverse country. She examines the history of Singapore's language policy that remains largely
unchanged, varying only in its lexical and textual realizations that which performances in the
service of a set of ideologies give rise to potentially serious problems; and the material
consequences of implementing the ideologies lead to changes in the ideologies themselves.
According to Eckert & Rickford (Eds., 2001), by drawing on recent theoretical developments
in the study of language ideologies, this paper shows how attention to the sidedness of
language ideologies can help provide greater specification and appreciation of the
interactional processes by which the ideologies are instantiated.
In an article of Susan Ervin-Tripp of University of California, Berkeley, she examined
the role of ideology in the relation between social group language differences and the
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 111
representation of those differences in each speakers style contrasts. The major highlights of
the study are:
1. That social meanings signified by styles, which are primarily contrastive
and indicated empirical distributions.
2. That the principle of iconization is claims that the social contrasts that are
imputed to groups or to situations are also represented by linguistic
features.
3. That language features that supports iconization, using the underlying trait
explanation (e.g. Wolof Speakers).
4. Those beliefs about contrasts in the traits of groups of people are consistent
with contrasts in linguistic features, and these correspond to stylistic
selections when traits are expressed by individuals.
5. Iconization could create an arbitrary relation of trait to feature, historical,
contingent, or conventional. But in the Wolof case, the relation appears not
to be arbitrary, but to have some naturalness, and the term icon implies a
likeness. (Retrieved May 25, 2009 from http://ist-
socrates.berkeley.edu/~ervintrp/pdf/dialect.shifting.pdf)
In similar study by Woolard, K. (2008), emphasised on re-conversation between
linguistic anthropology and sociolinguistics is to bring concepts of linguistic ideology to the
explanation of the iconization of specific sociolinguistic variables and associated
sociolinguistic change. Sociolinguists such as Eckert (2000) and Milroy (2004) have made
provocative efforts to incorporate linguistic-anthropological concepts into sociolinguistic
explanation. The author is pause a question why specific linguistic variables emerge from
the flow of speech and social life to become sociolinguistic icons or emblems and set off
relatively rapid or intense changes. In anthropological discourse, the study of iconization
proves its worth in revisiting the past in connecting to modern time through semiotic process.
Accordingly, forming and reshaping ones memories involves much more than a simple
retelling of ones own personal story, it involves the semiotic processes of highlighting and
an iconization of certain practices as modern, whereby an erasure occurs, denying the
existence of that which comes to be experienced as lost. Among the major points which the
author asserts are, to wit:
1. That through the conscious highlighting of particular patterns of behaviour,
ways of speech, and modes of understanding the world, these aspects of
experience come to be iconized as the modern.
2. That Ideological iconization is accompanied by an erasure of that which is not
iconized.
3. Those that are not seen as modern are erased; they are forgottenoften
wilfully.
4. That those that are written out of history or often reinterpreted as an
impediment to progress, primitive people and their antiquated ways.
5. That there is a conscious selective forgetting, the purging of certain
unacceptable elements from the narrative historical record.
6. That a transmission that always contains the possibility of betrayal, of an
arbitrary selection from the past.
7. That which is written out of history, constructed as the vanquished past out of
which the future-oriented present has emerged, by the ideology of modernity
because it does not serve the needs of the dominant classes, comes to be
experienced as a loss, a loss that may be longed for, in a nostalgic desire for
that which is beyond reach.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 112
8. That semiotic process of erasure and the psychoanalytic process of repression
both involve a reimagining of memories, memories that are not exclusively at
a personal level, but that are constrained and in some senses given by the
dominant political narratives.(Woolard, 2008),
CONCEPTUALIZING IDIAS: THEORETICAL FRAMEWORK
\
Figure 1. Adoption of the Principle of Iconization from various academic fields
The literatures reviewed yielded variety of views on the concept of iconization as a
method of understanding and analysing reality. Its adoption to the IDIAS is relevant as it
captures the purpose of the project at hand. Perhaps customized adaptation on the variety of
approaches and principle of iconization is dealt with great influence to the research. The
application of which is an agglomeration of various approaches and employing icons such as
disguised symbolism, codes, scales, emblems, color combination, images, personalities,
audio-image, material culture, text and any other form that represent a historical event,
personalities and places and in particular learning objectives.
The constructivist and connectivism theory of learning serves as the foundation of
IDIAS and an application. This is further strengthened by adopting the affordance theory
which states that the world is perceived not only in terms of object shapes and spatial
relationships but also in terms of object possibilities for action since perception drives
action; and has various implications for design, human-computer interaction, ergonomics,
visualization, etcetera (Gibson, 1904-1979). Guinans (1997) Icon Language Teaching
System is replicated in this project except that its application is in teaching English language
and her ready-made icons are patented not built on learners constructive imagination.
Similarly, inspired by the study of Calloni et.al. (1997) Can icon-based programming
languages be used to teach first year programming concepts to undergraduate students more
effectively than text-based languages? which was proven positive. Hence, the framework of
the proposed IDIAS is to be customized to any course selected for application.
iconization
Computer
Science
Psychology
History
Anthropology
iconograph
y
education
sociolinguistic
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 113
General Salient Features of IDIAS: (technology, logistics, learning method, student,
faculty, administration).
Development of courseware in all subjects in Program Offering
Theatre type Multi-Media classroom system to increase class size
Production of Interactive Digital entertainment-like Course Modules (topics can be
3D presented)
Classroom environment adopts entertainment medium and eradicates boredom
Computer based Assessment/Evaluation System, possible use of touch screen
Monitor
Theoretically back by Icon, Logo, sign, symbol to enhance learning retention
Dual mode Learning system still retaining Face to Face but subjects are computer
based presentation and advocate team teaching
Synchronization and customization of educational universal academic standard
Promote social harmony, awareness global issues that threaten human survival.
Teaching
Learning
IDIAS
interaction
icon
Evaluation
Figure 2. Adoption of the Principle of Iconization in the IDEAS
Subject to be
Taught, Teaching
Goal, Method,
Style , Technique,
Tools and
Evaluation System
Learner
internalizes
learning
goals/skills,
Learning capacity
and preparedness
Evaluation/
Assessment
System:
Learning goal
Oriented
Environment
Conducive to learning
(Affordance theory)
Teaching-Learning
is culture bound and
Divine Driven World
view, and
Technology
enhanced
Teaching-Learning
is balanced centered
on Teaching,
Learning and
Evaluation
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 114
A prelude towards divine driven learning
Advocates less stressful learning
Facilitate Zooming in order to level-off the learners learning capacity
Reduce teaching load and cost saving for the University for not hiring more
teachers for courses that does not require Ph. D. or M.A. Degree
Eradicates banking system of education
Icons can be value free, objective capturing common human values and experience.
Teaching and Learning Features:
It is culture bound
It must be divine driven
Technology enhanced
Ensure Internalizing learning objectives
Balance centered but slightly tilted in favour of the learner to assure better academic
performance that would give relevance to real life.
The interaction is inevitable in teaching- learning environment but the magnitude of
interaction depends much on the nature of the subject.
Learners shall build icon based on their construct as a class and perhaps make a
video presentation on particular events in history.
The classroom environment will conducive as it will be held in a theatre like
classroom
Assessment Feature:
Emphasis on internalizing learning goals rather than mark or grade oriented
particularly on the mandated general education courses (Math, Social Science,
Humanities, History, and Psychology).
Online Quiz shall be allowed
Why Iconization of Learning
In this contemporary reality of globalization and fast developing digital information
technology, the learning process and environment is transforming. The e-icon is changing
many of our vocabulary. A single prefix that gives new meaning to established concept.
Similarly revolutionized how we perceive, understand and conduct our affairs. Several
scholars attested that the world is becoming digital faster than we expect. Digital divide is a
new social stratification category as the knowhow, access to digital technology and hardware,
and its utilization has yet to trickle down to many. David (2003, p. 272) succinctly described
that, the advent of digital television has resulted in an explosion of cheap programming
throughout the world, and lifestyle programming in particular. Moreover, the Internet will
definitely change the future which is largely a part of our present. As the cyberspace is cross
culturally diverse, the future direction seems towards digital education. Multifarious learning
style and methods is keeping attuned to the trend of time. As the knowledge based society is
transforming many nations, traditional conventional learning is becoming obsolete, as some
scholars have observed. Learning seems to be easy but expensive. The role of teachers will be
more innovative equip with wider creative understanding, exhibiting maximum tolerance,
less dogmatic, flexible and less ego-centric. The school is just an inch away compared in
those days where one has to walk kilometric distance afar. As digital technology connects
people everywhere, learners are static traveller as one can sojourn the globe in just a click of
a mouse. Exchange of ideas and experiences from the four corners of the world can happen in
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 115
split seconds, as distance does no longer matter. The interactive chat rooms in the web readily
proves that interaction and learning takes place without regard to national boundaries and
identity, ethnicity, age, gender, political ideological leaning, religion, interests, social role and
position, and lastly an informal open interaction environment. The use of icons provided by
most websites was universally accepted symbols of interaction in putting across message and
emotion. Henceforth, icons facilitate learning easy, less stressful to recall, aesthetic
consideration, prompt and concise in conveying ideas and feelings.
Designing a learning system to the most complicated creature in world is the most
challenging and mindboggling concern. Admittedly, there is no one stop learning method
akin to downloading software in the computer. However, there are no proven universal
pedagogical standard that are efficient and effective learning method.
The Iconization of Learning is NOT a new invented concept but encapsulating existing
known theories of learning to be adapt with digital trends in the a generic wireless world. It is
a recycled thought given a new label borrowed from computer electronic language and
software. Besides, computer is universal learning tool aid. The iconization of learning to
traveller learner can draw parallelism to a driver who internalizes road and traffic sign.
Similarly, to pilot who memorizes signs and symbols to fly and land the aircraft; to a sailor
and ship captain who have a common understanding of symbolic commands and signs; goods
and services employ logo as part of the marketing strategy; and lastly a musician
guitarist/pianist who uses same chords or musical note. Most institution and social
organizations have logo that represents their respective institution.
Now a days, the amount of images, words, text, sounds that are encoded, stored and
compressed digitally that are available for any purpose and can be viewed and send
regardless of time and location through the net is gigantic and with utmost speed and
precision. Many were largely represented by an icon, which are either subjective or objective
construct. As proven in the empirical studies of Gulz and Haake (2005) that user preference is
to the iconized visualization that represents a relation oriented and more subjective agent.
The main research problem was to determine the significant relations between the users
choice of visual style in agents with respect to realism versus iconicity and users choice of
social style with respect to task orientation versus (task and) relation orientation (Gulz &
Haake, 2005, p 7).
In their findings, it implies that iconized agents being more easily conceived of as
subjective, socially rich characters than realistic agents .The main supporting idea of this
study to the proposed ideas are: an iconized character in contrast to a realistic one prompts
the user to develop the character; it allows user to stretch his imagination; and can be
elaborated by the user, who may fill in and create from his or her own subjective experiences.
The uniqueness of the study to what is proposed on this project is treating separately visual
style and iconic images e.g. animation. Icon as advocated in this project is a combination of
images, text, animation, virtual reality, and historical established personality, places, events,
artefacts that the learners may at liberty to construct.
Iconization of learning as conceptualized in this study can be build along learners
construct. It can be computer based and flexible in a way that it can zoom in and out to the
level off the learners common perception and understanding of concepts and reality. It was
proposed to be all- embracing and will incorporate global issues and trends like climate
change, wars, water crisis, HIV, and other threats to human life and environment. A three
dimensional presentation can be alternative style to form part of the medium of instruction.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 116
In the context of Madrasah, iconization of learning could be an attempt towards
eradicating traditional banking system of education. It can enliven classroom environment
and transform it into a partly entertainment venue to arrest the classroom boredom. It can also
reduce teachers load and routine functions, and or perhaps eliminate the incidence of ego-
tripping teachers. Through Iconization learning can improved current of state instruction to
be more meaningful and relevant given the new pedagogical style.
The concept of iconization of learning has many theoretical bases to support. Several
theories of learning that support the Icon aided learning and embrace some of its principles
are shown in Figure 2. It is already widely used and universally accepted as a form of
communication not only in the internet and mobile communication systems but also in all
fields. It can be either ephemeral or permanent and can be built spontaneously based on
learners preference, interests, shared experience, thoughts and emotions. It can easily create
common denominator to a learners diverse worldviews, values, beliefs and experiences.
Perhaps intellectual and emotional quotient can have less bearing on the learning process if it
aims simply to impart less complex thoughts or ideas. Icons can have longer memory
retention in human memory as explained in Dual Coding Theory. It also recognizes the
inevitable importance of image in cognitive operations compared to verbal information.
Memory theory claims that no learning takes place without imprints in human memory. Icons
are processed to various levels of learning and understanding.
Figure 3: Theories and principles of learning that supports iconization of learning
The following theories of learning and principles of learning adopted and combined
together to accounts in the conceptualization of Iconization of Leaning, to wit: Adult
Learning, Algo-Heuristic Theory, Andragogy, Anchored Instruction, Constructivist and
connectivist Theory, Cognitive Load Theory, Conditions of Learning, Double Loop
Adult Learning,
Algo-Heuristic Theory
Andragogy
Anchored Instruction
Constructivist theory
Cognitive Load Theory
Conditions of Learning
Double Loop Learning
Experiential Learning
Model Centered Instruction and Design
Layering Minimalism
Functional Context
Phenomenology
Script Theory
Subsumption Theory
Symbols Systems
Structural learning theory
Motivation theory of learning,
Theories of Learning as basis of ICONIZATION OF LEARNING
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 117
Learning, Experiential Learning, Model-Centered Instruction and Design Layering,
Minimalism, Functional Context, Phenomenolography, Script theory, Subsumption Theory,
affordance theory, and Symbol Systems Structural Learning Theory. The Motivation theory
of learning similarly is essential to the concept discussed.
The Book of David Gilles (2003) entitled Media Psychology have studied extensively
and proved that media has indeed have great psychological impact and influence on the
behaviour of audience that watch it. The book proves the causal relation between media
effected the behavioural changes in all age group and effectively transmit message and
ensures retention or recall. Thus further strengthen and validity of the Iconization of learning
as applied to curriculum and pedagogy, though the distinction between reality and
representation is much less clear than we often imagine (David, 2003, p. 282). An off quoted
expression in psychology is the 7-38-55 presentation rule where 7% of the communication is
the words that you are using, 38% of the communication is the tone of voice and 55% of the
communication is what you are doing visually, consisting mostly of facial expressions.
In gist, the figure 3 presents how simply iconization of teaching-learning process takes
place as advocated in this project. The teacher provide the learners with direct course
readings or lectures then allow independent learners to individually and collectively
internalize learning objective and conceptualizes or assign icons to particular subject of
study. The learners will be required to make report presentation employing said selected
multimedia icons and used the same for classroom interaction and evaluation.
Figure 4 : Teaching-Learning Iconization Process.
IDIAS: An Organizational Transformation Initiative
Situationer: Madrasah State of Instruction
The IDIAS as proposed is the digital technology based initiative for organizational
transformation. Although other organizational transformation approaches would similarly
manifest, both explicit and implicit along the process. The locus and focus of IDIAS is
enhancing classroom environment, and to promote and improve teachinglearning which is
Teacher
Course Content,
Readings &
Objective
Evaluation System
Suggested Icons
Course or Subject
Teaching &
Learning Interaction
InternalizingLearnin
g Objectives
Icons of Agreed
Topic
Learner
Individual &
Collective
preferential icons
Learners' Constructed Icons
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 118
the end goal of any mode of instruction. However, the assessment component of this initiative
is to suit the new advocated mode of teaching and learning.
In the quagmire of the unpredictable challenges brought about by this technological
development, the need to revisit the state of instruction in madrasah with particular focus in
teaching Islamic History. A need to review the state of instruction in order to validate the
need for adoption of the proposed IDIAS. It should be emphasized that Madaris in the
Phillippines is not regulated nor accredited though policy initiative of integrating them to
Philippine educational system have been initiated as mandated in the Tripoli Agreement of
1976. But still largely Madaris in the country are community owned and regulated. Therefore,
by implication not logistically subsidized by the government neither regulated nor accredited
though initial efforts have been initited. The state of instruction can be loosely described
based on personal objective observation. Some observations on the state of instruction
bulleted as follows:
Still face to face classroom Learning method, augmented by reading, reporting and
educational tour
Still maintain Learning by doing method through laboratory and field work.
An instruction is typified as Banking System of Education.
Utilization of Digital Information technology is not widely use.
Gaps in knowledge creation due to highly dogmatic Organizational Culture
Some teacher are lax due to less emphasis on learning objective.
Not many asatid faculty are multi-media literate.
Internalizing the course is minimal as relevance of the GES to the degree is not
realistic and boring.
Evaluation oriented teaching method not on internalizing the learning goals
Madrasah lacks innovative process in the delivery of learning
Most Classroom are equip with black board, eraser and chalk
Computer-Student Ratio is inadequate.
Young generation are computer enthusiast thus gaps exists between teaching method
and learning style of students.
Principles in Organizational Transformation Applied to IDIAS.
The proposed IDIAS is largely Information Technology based organizational
transformation initiative. Other organizational approach like Appreciative Inquiry and
Organizational culture serves to reinforce. The IDIAS as designed initially for History
courses and must be initiated in a bottom up approach in order to be officially appreciated
and adopted instructional innovation. However, the proponent has to take extraordinary steps
to personally carry-out the project in anticipation of inevitable resistance. However the
assumption that the proposal as givens are steady supply of electricity, available hardware
and technical experts.
How IDIAS transform Teaching and Learning Delivery
There realities which needs to be considered in justifying the adoption of IDIAS.
First, there is a gap between teaching and learning. Second, the madrasah lacks innovative
process in the delivery of learning is recognized. Third, studies proved the causal relation
between media effected the behavioural changes in all age group and effectively transmit
message and ensures retention or recall (David, 2003, p. 282). Fourth, immersion to the past
is no longer impossible as the availability of Virtual Reality which is an immersive and
interactive simulation of either reality-based or imaginary images or scenes (Allison, 2007,
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 119
p.344). For example, massively Multi-Player Online Role Playing Games (MMORPGs),
Alternate Reality Game (ARG), the Transparent Telepresence Research Group (TTRG)
Head-Mounted Display (HMD) Cave Automatic Virtual Environment (CAVE) are Virtual
reality tools that allow students to question what is real and to explore a multiplicity of
different pasts in an immersive experience (Allison, 2007, p.344). Fifth, some of the teachers
role in constructivist perspective will change as it will lessen the subjectivity and personal
temperament of teachers and direct classroom control is minimal.
The IDIAS as proposed can be done in two ways first is maintaining the face-to-face
environment but a large class size and allow the learners to develop their imaginative
construct by assigning them individually or by group to make a digital report on chapter in
history. The learners will be asked to develop a 3D animation using simple software that they
are familiar with like MS Power point, and or movie maker tools using methodology of
iconization. This will form part of a collection on how learners will be able exploit their
digital know-how to be virtually immerse in the past. This can be done simultaneously while
team of expert will design a model courseware using virtual reality tools as suggested by
John Allison (2007). Another option is to facilitate a speedy production of the model by team
of expert sanctioned by the university. In this manner, the teaching-learning environment will
change like subjective and ego tripping style of teacher will be eventually eliminated. The
team teaching will replace monotonous routine life of teachers. The student labelling of terror
or lenient, and or popular against unpopular teacher will be addressed. Hence, the learners
imaginative construct will be enhanced by adopting the transformation theory of Mezirow
(1991, cited in Anderson & Elloumi, 2004, p.18) combining constructivism and cognitivism
theory. It claimed that learning involves five interacting contexts: the frame of reference or
meaning perspective in which the learning is embedded, the conditions of communication,
the line of action (process) in which the learning occurs, the self-image of the learner, and the
situation encountered during the learning process. Accordingly, transformative learning
involves reflectively transforming the beliefs, attitudes, opinions, and emotional reactions
that constitute our meaning schemes or transforming our meaning perspectives (Anderson &
Elloumi, 2004, p.18I). In application to the project at hand, the process of using a collective
interpretation and construe a new or revised iconized interpretation of the meaning of ones
experience in order to enhance memory recall and perhaps internalizes learning objectives for
future use. Issue on Interaction.
The interaction is important in teaching-learning component without it, learning will
take not take place. The need for minimal or optimum interaction depends largely on the
nature of the course like mandated general education courses are fix and a definite knowledge
that interaction can be designed as asynchronous or synchronous. The objective of said
courses is imbibing and internalizing learning values and facts. Hence, the issue of interaction
in the proposed IDIAS can be addressed.
Mental Change
The concern on mental change is necessary in any transformational initiative. The
digital technological challenges is inevitable either we change or we phase-out. The death of
work will come if we do not be abreast with the current trend. The teachers should realize
that they are not indispensable even if they have assured of permanent tenure in their
vocation. The organizational transformation will definitely take place in order to be relevant
in the society and particularly at par with educational institution. First, change in the attitude
towards work must take place. Second, by keeping abreast with technology for the
advancement of the teaching-learning style means making oneself indispensable in the
organization. Third, the global terrain of teaching and learning is rapidly and irresistibly
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 120
changing, refusal to change means self-outcaste in the roster of educational institutions that is
the bedrock of innovation and change. Fourth, mental change means institutional change,
organizational changes takes place after people in the organization succumb to mental
change.
How IDIAS transform Assessment System
In the long run, teaching history could be image-based, three dimensional, and in
which text does not play a big role. This can be indicated as the trend for example in graduate
program that some disciplines are pressured and sometimes heated discussion on the move
away from the traditional text-based dissertation (Allison, 2007, p. 348). The Gutenberg-e
Project at Columbia University is taking substantial steps toward a virtual reality history
dissertation with their multi-media (i.e., photographs, audio, and video) searchable
dissertation publication program (Allison, 2007, p. 348). Once the use of virtual reality tools
in teaching history becomes popular, eventually new assessment system follows. The
traditional assessment practice will be blended with the digital system or software. For
example, online assessment can be designed that will give relief to teachers routine checking
quizzes, essays, and exams. A shared peer assessment shall be put into account in cognizant
to the presentation performance as the learners will be able to make a similar virtual tool in
presenting the past. According to Alison (2007, p. 347), by critically appraising new ways of
presentation is not an easy task for history educators who have trained for their entire career
to think of presentations in one way. Accordingly, the teachers and students can then travel
to a variety of three-dimensional historical locales and presentations through virtual
simulations could also provoke sharp memories of past events in the context of oral history
(Allison, 2007, p. 347). By adopting this method, hence, marking learners performance
should be collaborative or shared assessment thus minimize the unlimited discretion of
teacher in the assessment though claimed to objective but not transparent particularly in essay
test and term papers. Giving assessment to qualitative work like essay or written exam is
largely subjective to teachers discretion, and by peer collaborative marking of presentation,
output can be more transparent and objective. The criteria for marking can be designed to
capture the audience impact of the presentation and overall style of presentation.
How IDIAS Transform Teaching Profession
The teaching of history is very important as a means of communicating the past to
future generations (Allison, 2007, p. 350). Once Alison (2007) works becomes dominant
teaching method, history teachers of the future will be using visual and graphical tools less in
textual presentation. In the near future online classroom will be realized as part of the
proposal. The do-it-yourself teaching will form part of the teaching method. Though, the text
will remain important and inevitable in writing history but in teaching it is more on visual. As
categorically state by Anderson and Elloumi (2004, p.18) that the learner is the centre of the
learning, with the instructor playing an advising and facilitating role.
By this input, it can be gleaned in the future that teachers in history is no longer
monotonous routine and boring. Perhaps, teachers can be known not only in their ability to
write textual history but visually present history through virtual reality tools. The teaching
profession is becoming more challenging. To cling to the traditional mode of teaching
history, one will be left behind as thing of the past. The teaching of history requires not only
ability to textually convey history but digitally connect past to the present as if simulating
past in the present to guide us for future. Teaching history is no longer the ability to play
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 121
words and fluency in oral communication but the challenge of multimedia presentation of
simulating and presenting the past.
How IDIAS help the university cost-efficient reduction
The observation of Geraldine Lefoe (1998) on the continued reduction of
government budget subsidy to Australian universities and for universities opting to apply
user-pays principle is also true in the Philippines decades ago. The cost-efficient reduction
strategy and out sourcing like increasing tuition fees are commonly observed, but not
venturing on Web-based instruction. The increase in enrolment population led to the demand
for larger class size in the midst of government budget cut. The government state universities
were mandated to institute innovative measures to respond to the cost of operation. The
proposal will help in cost-efficient reduction program as it will save in hiring new teachers,
reduce teaching loads, and serve as income generating as users charge for multi-media
classroom will be adopted.
The proposed IDIAS is indeed an Organizational Transformation (OT) initiative that
proves backing from known OT Principles as discussed, and with strong theoretical
foundation. As an information technology based pedagogical change, several assumptions
shall be considered like energy supply, hardware availability, human resource technical
capability, stable internet connection and university management support are givens of the
proposed IDIAS. The requisite for the IDIAS to take-off is a mental change that should form
part of the implementation particularly in a setting where aged faculty find difficulty in
adapting to the new technological innovations. The history teachers should be abreast with
the digital know-how in order to be at par with the trend. The teaching-learning-assessment in
madrasah will be digitally transformed in the proposed IDIAS.
STRATEGY
The project at hand offers two major innovation initiatives that would transform
traditional teaching-learning environment. First is the IDIAS that advocates the optimal
utilization of digital technology in the classroom. Second is the use of icons as pedagogy in
teaching-learning and assessment technique and perhaps a teaching theory. These agenda for
innovation are conceptually link to serve as a jumping ground towards online or distance
education to level off the Muslim educational institution academic standard at par with
internationally known universities. In simple terms, it serves as a transitory measure in
liberating the university from the burden of chalkboard era and face-to-face teaching-learning
style. It shall be acknowledged the IDIAS is a long process to be attained in the near future
but iconization of learning can take place in a given time and acceptability provided that
information dissemination and consultation with colleague be addressed.
In preparing Muslim educational institution in the 14
th
Hijrah or 21
st
century as it
visioned to become an institution of higher learning which provides diversified, demand-
driven and highly competitive degree programs. It strives to become the quality provider of
Islamic education must institutionally realize the need to change, contend with the pressing
current challenges, and act on the necessary organizational reform. Such innovation must
meet the requirements as suggested by Schuler and Jackson (1987) to be interdependence,
long-term focus, risk taking, flexible and tolerance. And culturing and sustaining the same
must arrest and manage the obstacle to change and ensure structural and cultural support
system are in place. As Waddel et al. (2000, p. 164-5) succinctly describe that a meaningful
change comes only with provision of extra resources; reinforced by skills, competencies and
desired behaviour; and structural support system are instituted. Most state universities are
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 122
imprisoned by government laws and regulation must negotiate for more political autonomy
and meaningful academic freedom to address the observation of Schiffer (1980, p. 158) that
innovation requires addressing the political question of who makes and what decisions is
crucial in order for innovation to prosper. This condition warrants that the innovation should
be incremental and slow but sure, and the strategy for innovation must be structured to
subscribed to building of a safe environment for knowledge workers as advocated by Drucker
(1994), building of trust and teams as advanced by Geist and Hoy (2004, p.2-4), and building
capacity for learning. Michael Mercers (2001) seven approaches to manage recalcitrant
employees would be helpful strategy in dealing with those who resist or challenge IDIAS.
Accordingly, the purpose and objective of change must be understood by them. The
employees taking part in the decision making will strengthen in building teamwork that
psychologically put pressure in accomplishing the job done on target schedule. In providing
reasonable incentive pay and acknowledge individual success but termination would not be
dealt with humanitarian consideration. In gist, the overall strategy must be holistic in
transforming a professional learning organization.
However, confining to the project at hand, the Figure 4 shows the Matrix Model below
is suggested to form as an initial strategy for innovation.
Figure 5: Iconization of Matrix Innovation
The Obstacle to Innovation
The lack of budget or logistical requirements and necessary skills needed are common
obstacle to innovation. The Asatids madrasah faculty needs computer training though some
Asatid faculty will not likely surrender a portion of their comfort zone and traditional
pedagogy. The digital divide as realistically acknowledge is manifested in the management
level as the gap exists in the appreciation to the potential institutional benefits that can be
derived in investing to upgraded computer hardware and software. In sum, the primary
impediments to the project are mental, technical, structural and logistical in nature.
The iconization of learning as a teaching, learning and assessment method can be
strategically implemented within the existing reality. It is a matter of academic and
Realization of the Need to
change and Identifying the
obstacle to IDIAS
Secure extra resources thru
proper political
represetation and
Networked Organization
Create teams for Advocacy
Provide an avenue for skills
training to create a critical
mass for institutionalization
IDIAS thru
Iconization
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 123
intellectual appreciation of the concept. This can be done in a classroom level but
incremental, gradual, and effective. A teachers initiative and commitment is only required.
However, the bulk of producing digitally designed instructional materials can only be done
by collaboration of experts.
In addressing the strategy for innovation, a bottom up approach is preferred considering
the nature of the project and skilful scanning of the organizational reality, and the
proponents limited role in the university. The model below is suggested for implementation
of the project.
Figure 6: Model Strategy
Conclusion
The challenges of the 14
th
Hijrah or 21
st
century to muslim educational institutions
must be responded with utmost precision and careful understanding of the impact, both real
and anticipated. Think globally but act locally guided by the principle of sustainable future
must be part of the central theme for any Muslim educational reform.
The proposed IDIAS thru iconization of learning is not a new concept but rather an
enhanced and revitalized for general application in the teaching and learning environment.
The problem statements of the study have been academically scrutinized to elicit its
potentials as a pedagogical innovation. The review of literatures has yielded more than what
is expected by the proponent. The theoretical foundation to support its academic validity as a
teaching-learning theory and as an organizational transformation initiative is well founded.
Some literatures have proved the application of iconization of learning noting only some
discrepancies with what is proposed to be a teaching-learning technique in maintaining the
traditional face-to-face classroom pedagogy but with great potential contribution towards
multimedia instruction system. As the race to online digital education is becoming steep, the
Muslim educational institution must not sleep with its predicament in not joining the
competition.
The proponent had stumbled on a more pressing concern on how to deal with
evaluating the state of instruction in the absence of accepted models, methods and criteria of
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 124
assessment. The constraints of time, logistics and delimitation of the study does not warrant
on delving deeply of such concern though, its importance is paramount to the project.
The findings somehow elicit more information vital to the success of the project like
the expected obstacles and the strategy to be employed in the actual implementation of the
project. Hence, the project at hand is doable.
Recommendation
1. An assessment of the state of instruction of Madrasah must be conducted as prelude to
the Phases of the project.
2. A series of Focus Group Discussion shall be likewise conducted parallel to the
assessment of state of Instruction.
3. Pool of Muslim educational expert must be encourage to explore further the
potentials of Iconization of Teaching-Learning and Assessment to promote and earn
more its academic and intellectual validity.
4. The stature of Malaysia it holds in the muslim ummah in the world, should scrutinize
and promote the same in order gain its prominence as a teaching-learning pedagogy
and exploit the digital use for the benefits of the graduates of Madrasah to become
relevant in todays generation of Knowledge society.
References
Allison, John (2008). History educators and the challenge of immersive pasts: a critical
review of virtual reality tools history pedagogy. Learning, Media and Technology,
Retrieved November 2, 2008 from http://dx.doi.org/10.1080/17439880802497099.
Anderson,T. & Elloumi, F. (Eds., 2004). Theory and Practice of Online Learning. Athabasca
University, Retrieved November 2,2008 from http://cde.athabascau.ca/online_book,.
Andronis, MA. (2003). Iconization, Fractal Recursivity, and Erasure: Linguistic Ideologies
and Standardization in Quichua-Speaking Ecuador. Eleventh Annual Symposium
about Language and Society. University of Chicago Austin. Retrieved November 2,
2008 from http//books.google.com.au/?books?hl or http//www.connectivism.ca
Angus, L. (2004). Globalization and educational change: bringing about the reshaping and re-
norming of practice, in Academic Search Premier, vol. 19(1), pp. 23-41.
Bouissac, P. (2005). Probing the dynamic interface between language and perception.
University of Toronto. Retrieved November 2, 2008 from
http//books.google.com.au/?books?hl or http//www.connectivism.ca.
Beare, H & Slaughter, R (1993). What can I do? some bridging strategies. Education for the
twenty-first century. London :Routledge
Br Brady, L. (1995). The system', Curriculum development. Sydney, NSW:Prentice Hall
Beare, H., Caldwell, B. J., & Millikan, R. H. (1989). Creating an excellent school: Some New
Management Techniques. London, UK: Routledge
Buniges, M. (2005). What is driving curriculum reform in Australia?, vol. 4(9), pp. 1-6.
Caplan, Dean. The Development of Online Courses. In Terry Anderson & Fathi Elloumi
(Eds., 2004). Theory and Practice of Online Learning. Retrieved November 2, 2008
from http//cde.athabascau.ca/online_book Athabasca University.
Cohen, L & Manion, L. (1984). Research Methods in Education . London:Routledge
Calloni, B.A., Bagert, D.J, & Haiduk, H.P (1997). Iconic programming proves effective for
teaching the first year programming sequence (pp. 262 266) Vol.29(1), New
York, NY, USA: ACM SIGCSE Bulletin. Retrieved June 1, 2009. From
http://portal.acm.org/citation.cfm?doid=268085.268189
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 125
Constantino. R. (1970). The Mis-education of the Filipino. Diliman, Quezon City: University
of the Philippines Press
Crowther, F., Stephen, K.S., Ferguson, M., & Hann, L.(2002). Teachers as leaders :
emergence of a new paradigm, in Developing teacher leaders : how teacher
leadership enhances school success. Thousand Oaks, California, USA: Corwin Press.
Danaher, P. A. et. al. (2006). Transforming the Practice of Mobile Learning: Promoting
Pedagogical Innovation through Educational Principles and Strategies that Work.,
USQ FET 8801 Readings
Doru, M. and Kalender, S. (2007). Applying the Subject Cell Through Constructivist
Approach during Science Lessonsand the Teachers View. Journal of Environmental
& Science Education. Ministry of Education, Amasya. Deparment of Science
Education, Gazi Faculty of Education, University of Gazi, Ankara Gokkusagi Ltd
Eckert, P. & Rickford, J. (Eds., 2001) Style and sociolinguistic variation (p. 44-56). New
York: Cambridge University Press. Retrieved November 2, 2008 from
http//books.google.com.au/?books?hl or http//www.connectivism.ca
Fink, A. (1995). Designing program evaluations. Evaluation for education and psychology.
London:Sage Publication.
Fulp, C.D. and Fulp, E.W. (2002). A Wireless Handheld System for Interactive System for
interactive multimedia-enhanced Instruction. 32nd ASEE/IEEE Frontiers in Education
Conference November 6-9, 2002, Boston, MA Retrieved May 24, 2009 from
http://www.wfu.edu/~fulpc/papers/fie2002.pdf
Gay, L.R. (1992). Educational Research:competencies for analysis and application. New
York: Macmillan Publishing.ACT: Australian College of Educators.
Geist, J.R. & Hoy, W. K. (2004). Cultivating a Culture of Trust:enabling school structure,
teacher professionalism and academic press. Leading & Managing,vol. 10(1), (pp. 2-
40)
Gibson, J.J. (1977). The theory of affordances. In R. Shaw & J. Bransford (Eds.), Perceiving,
Acting and Knowing. Hillsdale, NJ: Erlbaum.
Gibson, J.J. (1979). The Ecological Approach to Visual Perception. Boston: Houghton
Mifflin.
Giles, D. (2003). Media Psychology. Mahwah, New Jersey: Lawrence Erbaum Associates
Publisher
Glatthorn, A.A. (1987). Supervising the curriculum : teachers and materials, Curriculum
leadership (pp. 221-242). Scott Foresman and Co, Glenview, ILL,. School
Administrators, Arlington, VA, pp. 85-103.
Glasser, W. (1990). Control theory and motivation. The quality school : managing students
without coercion, (pp. 39-56)., New York:Perennial Library
Guinan, M.B. (1997). Icon Language teaching System. Retrieved may 24, 2009 from
http://www.google.com/patents?id=lLUDAAAAEBAJ&printsec=claims&zoom=4
Gulz , A. & Haake, M. (2005). Social and Visual Style in Virtual Pedagogical Agents.
www.lucs.lu.se/Agneta.Gulz/publications/procWS_UM_2005.pdf -
Hargreaves, A. (1994). Changing work cultures of teaching, in F Crowther, The workplace in
education: Australian perspectives (pp. 39-51). Rydalmere, NSW: Edward Arnold
Australia.
Henderson, J.G. & Hawthorne, R.D. (2000). 'The vision and challenge of transformative
curriculum leadership', Transformative curriculum leadership (pp. 1-33.)( 2nd Edn.)
Upper Saddle River, NJ:Merrill.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 126
Howell, Recihard (2003). Visual Culture. UK:Polity Press Campbridge.
Hough, M. (2003). Principles for twenty-first century future-ing, in F Crowther, Teachers as
leaders in a knowledge society (pp. 9-21.), Deakin West, ACT:Australian College of
Educators.
Kennedy, K. (1995), National curriculum statements and profiles : what have we learnt?, in C
Collins, Curriculum stocktake : evaluating school currriculum change (pp. 153-171),
Curriculum Leadership : an Electronic Journal for Leaders in Education, Canberra,
ACT:Australian College of Education
Lambert, L. (1998). What is leadership capacity?, Building leadership capacity in schools,
Association for Supervision and Curriculum Development, Alexandria, VA, pp. 1-9.
Levin, B. & Riffel, J.A. (2000). Changing schools in a changing world', in NBascia & A
Hargreaves, The sharp edge of educational change : teaching leading and the
realities of reform (pp. 178-194). Falmer, London:Routledge
Marsh, C.J. & Willis, G. (1999), Curriculum planning : levels and participants', Curriculum :
alternative approaches ongoing issues, (pp. 184-220) (2nd Edn.), Upper Saddle River,
NJ: Merrill.
Macdonald, D.(2003). Curriculum change and the post-modern world : is the school
curriculum-reform movement an anachronism?. vol. 35(2), pp. 139-149, Academic
Search Premier, Retrieved May 29, 2009 from
http://ezproxy.usq.edu.au/login?url=http://search.ebscohost.com/login.aspx?direct=tru
e&db=aph&AN=9757038&site=ehost-live>.
McGaw, B. (1995). Benchmarking for accountability or for improvement?. vol. 21(2), pp. 7-
12, Informit.
Mecer, M. (2001). Managing employees who resist or rebel against change. In Mercer,
Absolutely FabulousOrganizational change: Strategies for Success from America.
Barrington, Il. USA: Castlegate Publisher.
Kop. R. (2008). Connectivism: Learning theory of the future or vestige of the past?
International Review of Research in Open and Distance Learning.Vol.9(3).
University of Wales Swansea, Adrian Hill Open School.
Lefoe, G. (1998). Creating Constructivist Learning Environments on the Web: The Challenge
in Higher Education. Centre for Educational Development and Interactive Resources.
University of Wollongong, Australia:ASCILITE.
Maedler, C., Fishcer, O. & Herlofsky, W. J. ( n.d.) Outside-In-Inside-Out . John . Benjamins
Publishing Co. Retrieved May 27, 2009 from
http://www.benjamins.com&linkid=1&usg http//books.google.com.au/?books?hl or
Marsh, C. J. & Willis, G. (1999), 'Curriculum planning : levels and participants', Curriculum
: alternative approaches ongoing issues (pp. 184-220). Upper Saddle River, NJ:
Merrill
Norman, D. (1988). The Psychology of Everyday Things. (pp. 87-92). New York: Basic
Books. Retrieved May15, 2009 from http://www.learning-theories.com/affordance-
theory-gibson.html viewed 5 pm oct20 or
http://www.bookrags.com/wiki/Learning_theory_%28education%29432-452(21)
Owens, RG (2004). Motivation', Organizational behavior in education : adaptive leadership
and school reform ( 8th ed.) (pp. 346-382). Boston, MASS: Pearson
Postman, N. (1995). The end of education: Redefining the value of school. New York: Alfred
A. Knoff.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 127
Schiffer, J. (1980). School renewal through staff development. New York: Teachers College
Press.
Siemens, G. (2004). Connectivism: A learning theory for the digital age. International
Journal of Instructional Technology and Distance Learning. Retrieved on November
2, 2008, from http://www.elearnspace.org/articles/ connectivism.htm
Siemens, G. (2008a). About: Description of connectivism. Connectivism: A learning theory
for todays learner, Retrieved November 2, 2008 from
http://www.connectivism.ca/about.html.
Siemens, G. (2008b). Learning and knowing in networks: Changing roles for educators and
designers. Paper 105: University of Georgia IT Forum. Retrieved November 2, 2008
from http://it.coe.uga.edu/itforum/Paper105/Siemens.pdf
Siemens, G. (2007a). Situating Connectivism. Online Connectivism Conference: University
of Manitoba. Wiki entry. Retrieved November 2, 2008 from
http://ltc.umanitoba.ca/wiki/index.php?title=Situating_Connectivism
Siemens. G. (2006a). Knowing knowledge. KnowingKnowledge.com Electronic book.
www.knowingknowledge.com
Siemens, G. (2006b, November 12). Connectivism: Learning theory or pastime of the self-
amused? Elearnspace blog. Retrieved November 2, 2008 from
http://www.elearnspace.org/Articles/connectivism_self-amused.htm.
Siemens, G. (2005, August 10). Connectivism: Learning as Network Creation. e-Learning
Space.org website. Retrieved November 2, 2008 from
http://www.elearnspace.org/Articles/networks.htm.
Skilbeck, M. (1982), 'The concept and the case for school-based curriculum development', in
V Lee & D Zeldin, Planning in the curriculum : a reader, (pp. 18-33). Sevenoaks,
KENT :Hodder and Stoughton.
Tripp, S. E. (n.d )Variety, style-shifting, and ideology. University of California, Berkeley.
Retrieved November 2, 2008 from Error! Hyperlink reference not valid.).
Wee, L. (2006). The semiotics of language ideologies in Singapore. Journal of
Sociolinguistics (pp.344-361).Vol.10(3), National University of Singapore. Retrieved
Nov. 2, 2009 from http.//www.interscience.willey.com/jounal/
118555543/abstract?CRTERY=1&SRETRY
Wiltshire, K., McMeniman, M. & Tolhurst, T. (1994). A school-based approach to
curriculum : how it operates and could operate in the future at the various levels of
schooling', Shaping the future - review of the Queensland school curriculum, vol. 1,
The State of Queensland, North Quay, QLD, pp. 193-213.
Woolard, K. (2008). Why dat now?: Linguistic-anthropological contributions to the
explanation of sociolinguistic icons and change. Journal of Sociolinguistics,
Vol.12(4), September 2008 .
http://www.msumain.edu.ph/_MSU_today/msutodayjan2008.pdf viewed august 21, 2008.
3.39 pm
http://www.census.gov.ph/CARAGA/HTML/PRESS%20RELEASE/Poverty%20Incidence.p
dfrrytown, NY, pp. 121-132.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 128
http.www.pahrdf.org
http://www.patsula.com/usefo/webbasedlearning/tutorial1/learning_theories_full_vers
ion.htm
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 129
INTEGRASI ILMU DALAM PENGAJARAN DAN PEMBELAJARAN USULUDDIN:
SATU TINJAUAN
Siti Saadiah Binti Shafik
Fakulti Pengajian Kontemporari Islam
Universiti Darul Iman Malaysia
sitisaadiah@udm.edu.my
Abstrak
Kajian ini membincangkan tentang integrasi ilmu dalam pengajaran dan pembelajaran
usuluddin. Pengunaan pengetahuan ilmiah mempunyai asas moral tertentu . maka ilmu dapat
dimanfaatkan sebagai sarana atau alat dalam meningkatkan taraf hidup manusia dengan
memerhatikan kudrat manusia, martabat manusia dan keabdian keseimbangan alam. Islam
telah melahirkan suatu tamadun besar yang telah membawa keamanan dan kesejahteraan
kepada dunia dan menjadi pendorong kemajuan manusia dalam aspek kerohanian, pemikiran,
moral dan keduniaa. Ilmu-ilmu yang berlandaskan kebenaran itu dapat membina sesuatu
tamaddun yang besar dan agong, bukan sahaja mengetaui ilmu agama sebagai ilmu dasar
kepada kita bahkan juga Allah SWT mengalakkan pencarian ilmu yang lain. Perbahasan
tentang teori pengetehuan adalah perbahasan falsafah kerana ia melibatkan perkara-perkara
yang mempunyai cirri-ciri falsafah. Oleh itu ia amat dipengaruhi kecenderungan falsafah
seseorang. Falsafah Islam yang mengnai teori pengetahuan berada di tengah tengah aliran
realisme dan idealisme. Semua ahli falsafah Islam bersetuju bahawa objek pengetahuan yang
paling tinggi dan mulia dala pengetehuan tentang Allah SWT. Pengetahuan-pengetahuan
lain mengikut urutan hirarkinya adalah pengetahuan tentang aqidah, hukum-hukum syarak,
ilmu mantik, ilmu akhlak dan ilmu kerohanian (tasawuf) dan ilmu Alam Semula Jadi, Ilmu
Matematik, Ilmu Matefizik di golong sebagai ilmu teoritikal dan ilmu Akhlak. Para-para
ilmuan Islam mempunyai daya kretiviti untuk mengabungkan pelbagai perjenisan ilmu
pengetahuan yang berbentuk teorikal dan praktikal dalam disiplin ilmu Pada dasarnya ilmu
digunakan dan dimanfaatkan untuk kepentingan manusia untuk mengetengahkan
kepentingannya dalam kerjaya, juga element-elemen yang memberi sumbangan dalam
prestasi kerjaya sama ada cara mengimplentasikannya dalam penyelidikan dan pengajaran.
Kaedah kajian ini secara umumnya menggunakan Metode pengumpulan data atau metode
dokumentasi. Penkaji akan membuat pengolahan dan penganalisisan terhadap data-data yang
telah dikumpul menerusi metode-metode yang dinyatakan sebelum ini dengan menggunakan
kaedah induktif dan Kaedah deduktif. Penyelidikan ini memberikan tumpuan kepada
bagaimana para pensyarah usuluddin mengaplikasi integrasi ilmu dalam P&P.
Katakunci: Integrasi ilmu dan Usuluddin.
PENGENALAN
Ilmu bererti pengetahuan yang bersifat global sama ada membicarakan dalam perkara dunia
dan akhirat . Ilmu juga suatu pencarian maklumat yang tidak diketahui kepada maklumat
yang diketahui melalui minda. Dengan pelbagaian cara kefahaman dan pengetahuan sudah
pastinya melahirkan bentuk ilmu yang berlainan .Ini dilihat dari sikap manusia yang suka
mencari dan berfikir, lantas menghasilkan ilmu-ilmu yang baru yang membawa manusia ke
era ketamaddunan.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 130
Setiap manusia dibekalkan akal oleh Allah untuk mencari kehebatan ciptaan Allah
SWT di muka bumi ini, maka mereka dapat menemuinya dengan izin Allah SWT. Di sini kita
melihat manusia dapat membina tamaddun yang hebat yang mencipta sejarah.manusia
berbekalkan ilmu yang mereka ada.
Sejak zaman kegemilangan ilmu pengetahuan yang bermula dari zaman kerajaan
Abbasiyyah perlbagai ilmu diterjemah dari bahasa Yunani ke bahasa Arab dengan banyaknya
seperti falsafah, politik, mantiq, fizik, falak dan lain-lainnya. Mereka mengkaji ilimu bukan
satu bidang sahaja tetapi mendalami dalam kepelbagaian ilmu , mereka mampu untuk
menggabungkan antara ilmu-ilmu yang lain.oleh sebab ketekunan mereka itu yang membawa
kejayaan mereka. Dan lahir para-para ilmuan seperti Ibn Sina , al-Khawarazmi, al-Farabi ,
Ibn Qayyim, Ibn Khaldoon, al-Razi, Jabir Ibn Hayyan , Ibn al-Haitham dan lain-lain.
Agama Islam menempatkan ilmu dan ilmuwan dalam kedudukan yang tinggi,
sejajar dengan orang-orang yang beriman . Hal ini dapat dilihat dari banyaknya ayat-ayat al-
Quran maupun al-Sunnah yang menganjurkan manusia untuk menuntut ilmu, bahkan wahyu
yang pertama kali turun adalah ayat yang berkenaan dengan ilmu yakni perintah untuk
membaca seperti yang terdapat dalam surah al-Alaq. Yang bermaksud:
Bacalah dengan (menyebut) Nama Tuhanmu yang menciptakan. Dia telah menciptakan
manusia dari segumpal darah. Bacalah dan Tuhanmulah Yang Paling Pemurah. Yang
mengajar (manusia) dengan perantaraan kalam. Dia mengajarkan kepada manusia apa yang
tidak diketahuinya (Surah al-Alaq, 96: 1- 5)
Umat Islam mendapatkan semangat yang luar biasa karena banyak sekali perintah
atau nas-nas yang menyentuh masalah keilmuan. Hal ini dapat dilihat pada masa awal Islam,
banyak sekali kegiatan pengembangan ilmu pengetahuan, bahkan sumber ilmu yang
dikembangkan itu berasal dari agama dan peradaban selain Islam. Para ulama banyak
menerjemahkan buku-buku dari Yunani dan Persia (Ahmad Y al-Hasan dan Donald R. Hill,
1993: 56-59). Namun usaha yang dilakukan tidak terbatas sebagai penterjemah saja, tapi juga
memberikan tambahan berupa saranan dan kritikan terhadap ilmu yang dipelajari dari luar
tersebut dan juga mengembangkan ilmu pengetahuan yang sudah ada, sehingga melahirkan
suatu teori baru.
Agama dan ilmu merupakan satu kesatuan yang tidak dapat dipisahkan. Islam
mengajarkan umatnya untuk senantiasa mengamati alam dan menggunakan akal yang mana
kedua-dua hal ini merupakan landasan untuk membangun ilmu pengetahuan moden. Perintah
mengamati berbagai fenomena alam mengajak manusia untuk berfikir secara empiris. Dan
penggunaan akal sebagai dasar dalam berfikir secara rasional.
Apabila ilmu dan agama dipisahkan maka akan terjadi mala petaka seperti teknologi
nukliar yang digunakan sebagai senjata perang; penggunaan bahan bakar minyak yang tidak
terkendali; sistem yang tidak memanusiakan manusia; dimana nantinya akan menghancurkan
peradaban manusia itu sendiri. Sejarah telah membuktikan bahwa pemisahan ilmu
pengetahuan dari agama telah menyebabkan kerosakan yang tidak boleh diperbaiki.
Keimanan harus dikenali melalui ilmu pengetahuan, keimanan tanpa ilmu pengetahuan akan
mengakibatkan fanatisme dalam kemandekan (Abudin Nata, 2005: 6). Menurut M Amin
Abdullah (pengantar dalam Ibn Rusyd, 2005: ii), Ibnu Rusyd merupakan ilmuwan muslim
pertama yang menggunakan metode integralistik-teosentrik.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 131
Usaha integrasi ilmu dan agama di Malaysia telah diusahakan oleh para pemikir
Muslim dan para sarjana. Begitu juga usaha Fakulti Pengajian Kontemporari Islam UDM
untuk memurnikan kursus-kursus di fakulti yang tidak hanya mempelajari ilmu-ilmu agama
juga mempelajari ilmu-ilmu umum.
Peranan pensyarah dalam soal ini begitu penting kerana penglibatan mereka dalam
pengajaran dan pembelajaran sesuatu kursus, maka sebaiknya mereka mengaitkan kursus-
kursus itu dengan ilmu-ilmu lain supaya nampak lebih efektif misalnya ilmu usuluddin boleh
dikaitkan dengan sains, psikologi, moral, astronomi, kaunseling dan lain-lain. Cara ini dapat
dilakukan ketika menyampaikan kuliyah dengan menekankan asal usul ilmu kepada pencipta
yang agong ialah Allah S.W.T .
DEFINISI ILMU
Ilmu itu knowledge lawan kepada jahil atau ignorance. Ilmu itu dihubungkan dengan
makrifah , fikh, hikmah dan daya rasa. Ilmu adalah hasil daripada pembelajaran, pada
peringkata permulaan, ahli fikir Islam membezakan antara makrifah dengan ilmu. Yng
pertama menunjukan kepada yang didapati melalui pengalaman yang pada mulanya tidak
diketahui. Yang kedua pula adalah pengetahun yang tidak dijelaskan sebagai berlaku secara
spontan ( berlaku dengan kehendak hati dan tidak dengan paksaan). Oleh itu makrifah adalah
secular knowledge dan ilmu adalah knowledge of God yang lebih menyentuh
keagamaan, apabila ilmu itu dikhususkan kepada ilmu yang berunsur keagamaan maka
sekular dalam bidang berkenaan di panggil ulama. (Ismail Ibrahim 1994: 39)
PERKEMBANGAN ILMU ISLAM
Dalam perkembangan keilmuan Islam, terdapat pengelompokkan disiplin ilmu agama dengan
ilmu umum. Hal ini secara langsung menunjukkan adanya dikotomi ilmu pengetahuan.
Kondisi seperti ini terjadi mulai abad pertengahan sejarah Islam hingga sekarang. Pada saat
itu ada sikap penolakan terhadap ilmu-ilmu yang bersumber dari penalaran akal seperti ilmu
filsafat, ilmu matematika dan lain-lain (Abudin Nata, 2005: 115). Sikap ini muncul akibat
perbezaan pemikiran yang menimbulkan adanya golongan-golongan dalam Islam. Sehingga
umat Islam pada saat itu mulai meninggalkan ilmu-ilmu yang dikategorikan dalam ilmu
umum (ilmu dunia) dan mengakibatkan umat Islam mengalami kemunduran dalam berbagai
bidang.
Pengunaan pengetahuan ilmiah mempunyai asas moral tertentu pula. Pada dasarnya
ilmu digunakan dan dimanfaatkan untuk kepentingan manusia. Dalam hal ini, maka ilmu
dapat dimanfaatkan sebagai sarana atau alat dalam meningkatkan taraf hidup manusia dengan
memerhatikan kudrat manusia dan keabdian keseimbangan alam. Salah satu alasan untuk
tidak mencampuri masalah kehidupan secara ontologis adalah kekhuatiran bahawa hal ini
akan mengganggu keseimbangan kehidupan (Jujun, S.Sariasumantri 1990: 5)
Untuk kepentingan manusia tersebut maka pengetahuan ilmiah yang diperoleh dan
disusun dipergunakan secara komunal dan universal. Komunal bererti ilmu merupakan
pengetahuan yang menjadi milik bersama. Setiap orang berhak memanfaatkan ilmu menurut
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 132
keperluannya sesuai dengan asas komunisme. Universal bererti bahawa ilmu tidak
mempunyai konotasi parokial seperti ras, ideologi atau agama (Jujun, S.Sariasumantri 1990:
5).
Sejarah dunia hari ini terpaksa mengakui bahawa Islam telah melahirkan suatu
tamdun besar yang telah membawa keamanan dan kesejahteraan kepada dunia dan menjadi
pendorong kemajuan manusia dalam aspek kerohanian, pemikiran, moral dan keduniaan. Ia
menjadi sumber utama ilmu yang bermanfaat bukan sahaja kepada timur tetapi kepada barat
yang telah mendapat darinya sumbangan intelektual dan moral dan juga ida-idea untuk
kemajuan kebendaan (Ismail Ibarahim dan Mohd. Sahri Abdul Rahman 1994: 45)
Oleh yang demikian itu, ilmu-ilmu yang berlandaskan kebenaran itu dapat membina
sesuatu tamadun yang besar dan agung bukan sahaja mengetahui ilmu agama sebagai ilmu
dasar kepada kita bahkan juga Allah SWT mengalakan pencarian ilmu yang lain.
Pada pendapat ahli falsafah bahwa keyakinan pada status ontologis atau eksistensi
objek-objek ilmu pengetahuan akan menjadi basis ontologis dari epistemologi yang akan
maju. Pernyataan tersebut menemukan momentum performatifnya ketika kita mengamati
ilmuan-ilmuan Barat seperti Darwin, Sigmund Freud, Emile Durkheim, Karl Marx, Laplace,
dan sebagainya yang 'menutup mata' terhadap eksistensi entitas-entitas metafizik. Lain halnya
dengan ilmuan Muslim seperti al-Farabi, Ibnu Sina, Ibnu Rusyd, Suhrawardi, Mulla Shadra,
dan selainnya yang memandang wujud (maujudat) metafizik sebagai entitas yang mesti
dipadukan dengan entitas fizik sehingga memberikan kepercayaan pada pengkajian semua
bidang yang berkaitan. Berkaitan dengan klasifikasi ilmu, penulis lulusan Universitas
Chicago ini berpijak pada klasifikasi ilmu teoretis ala al-Farabi yang mengelompokkan ilmu
ke dalam tiga ilmu utama: metafisika, matematika, dan ilmu-ilmu alam. Hemat penulis, ketiga
kelompok utama ilmu ini akan membentuk klasifikasi ilmu rasional yang integral, tanpa
menganaktirikan salah satunya. (h 212). Adapun klasifikasi ilmu-ilmu praktis, filasuf Muslim
juga membahagikan kepada tiga jenis, iaitu: etika, ekonomi, dan politik. Dalam hal
metodologi, atensi ilmuan Barat berfokus kepada metode observasi yang berpaksikan kepada
penekanan potensi pancaindra yang berorientasikan fizik. Penekanan seperti ini boleh
nampak jelas karena observasi pancaindra boleh sahaja meleset dan tak kuasa terhadap objek-
objek metafizik. Untuk itu, potensi akal dan hati atau intutusi juga harus dilibatkan dalam
pengkajian ilmiah. Jauh hari sebelumnya, tradisi falsafah Islam mengakomodasi seluruh
potensi tersebut sebagaimana terlihat pada konsep Suhrawardi yang membagi pendekatan
kepada dua bahagian, iaitu: diskursif (bahthi) dan eksperiensial (dzauqi).
KELEBIHAN-KELEBIHAN INTEGRASI ILMU
1. Pada dasarnya perbahasan tentang teori pengetahuan adalah perbahasan falsafah
kerana ia melibatkan perkara-perkara yang mempunyai ciri-ciri falsafah. Oleh itu ia
amat dipengaruhi kecenderungan falsafah seseorang. Falsafah Islam pula mengnai
teori pengetahuan yang berada ditengah aliran realisme dan idealisme. Ahli-ahli
falsafah Islam seperti juga kebanyakan ahli falsafah yang lain membahagikan
pengetahuan itu kepada beberapa jenis. ( Ismail Ibarahim dan Mohd. Sahri Abdul
Rahman 1994: 39) Semua ahli falsafah Islam bersetuju bahawa objek pengetahuan
yang paling tinggi dan mulia adalah pengetahun tentang Allah SWT.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 133
2. Pengetahuan-pengetahuan lain mengikut urutan hirakinya adalah pengetahuan
tentang akidah, hukum-hukum syarak, ilmu mantik, ilmu akhlak dan ilmu
kerohanian (tasawwuf), cabang atau perjenisan ilmu ini dihuraikan oleh al-Kindi
(796-873M) berdasarkan perjenisan yang dibuat oleh Aristotle, yang
membahagiakan pengetahuan kepada teoritikal dan praktikal. Al-Farabi (878-950M)
telah menambah cabang ilmu dengan memasukkan ilmu kalam dan ilmu fekah yang
tidak ada dalam perjenisan Aristotle dan al-Kindi. Ibn Sina (980-1036M) di samping
mengakui perjenisan yang dibuat oleh Aristotle telah membuat bebarapa tambahan
dengan bedasarkan kepada al-Quran, al-Sunnah dan pengelamannya. Ilmu alam
semula jadi, ilmu matematik, ilmu metefizik digolong sebagai ilmu teoritikal dan
ilmu akhlak, pengurusan bandar dan syariah sebagai ilmu praktikal. Al-Ghazali
(1058-1111M) pada period awal permulaan terpengaruh dengan perjenisan ilmu
yang dibuat oleh ahli-ahli falsafah terdahulu seperti Aristotle, al-Kindi dan al-
Farabi. Kemudia period kedua beliau mengkaji juga sebagai substant, ini dapat
dilihat daripada bukunya Ihya Ulum al-Din. (Ismail Ibarahim dan Mohd. Sahri
Abdul Rahman 1994: 40)
Jika kita renung kembali para-para ilmua tadi, mereka mempunyai daya
kretiviti untuk mengabungkan pelbagai perjenisan ilmu pengetahuan yang
berbentuk teoritikal dan praktikal dalam disiplin ilmu. Kita lihatlah berapa ramai
para ilmuan yang datang dari bidang yang belainan dan berbeza berkongsi ilmu
dalam melakukan penyelidikan, misalnya Fakulti Pengajian Kontemporari Islam,
Fakulti Pengurusan Perniagaan dan Perakaunan ,Fakulti Perubatan Sains Kesihatan
dan lain-lain. Dengan kata lain adanya integrasi ilmu dapat meningkatkan
produktiviti organissi itu dan kepakaran masing-masing.
3. Ternyata para ilmuan perlu memasyarkatkan ilmu, tetapi dalam penyempaiannya
harus sebijaksana mungkin. Juga betapa pentingnya penyebaran maklumat ilmu
pengetahuan dilakukan iaitu penyelidikan, penerbitan ilmiah dan melalui media
masa. Di pusat pengajian tinggi sering kali diberi makluman kepentingan
penyelidikan kepada para pensyarah untuk mempamerkan kesarjanaan masing-
masing. Melalui dasar ini membezakan anatara pensyarah dan guru. Maka dorongan
moral bagi para pensyarah dalam hal ini amat diperlukan. Misalnya seperti yang
sudah dilakukan oleh pelbagai pusat pengajian tinggi setiap pensyarah yang
menyumbang artikel dalam jurnal atau penyelidikan akan diberi point untuk
kenaikan pangkat.
4. Maka kelebihan integrasi ilmu ini dapat membantu pensyarah meningkatkan tahap
kecemerlangan dalam pengajaran dan pembelajaran. Setiap pensyara perlu tahu
peranan dan tugas menyampaikan ilmu dengan baik dan telus. Mereka adalah
pewaris para nabi yang mempunyai tanggung jawab yang besar dan mulia.
KESIMPULAN
Apa yang telah dibincangkan di sini ialah integrasi ilmu dapat meningkatkan kreadibiliti para
pensyarah dan kewibaan mereka walaupun dalam bidang yang berbeza-beza. Juga memupuk
semangat yang kuat untuk mempamerkan kesarjanaan masing-masing yang dapat
menghasilkan karya-karya yang lebih mencabar untuk diterima oleh masyarakat.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 134
Perpaksikan kepada perinsip-perinsip Islam maka integrasi ilmu dapat meyakinkan dalam
meningkatkan potensi kerja mereka.
CADANGAN
1. Semua pensyarah usuluddin dapat mengabung jalin kursus-kursus yang diajar dengan
ilmu moden.
2. Kursus-kursus usuluddin yang dikaitkan dengan ilmu-ilmu umum dapat mendedahkan
kepada pelajar tentang kepentingannya dalam pengajaran dan pembelajaran.
3. Pehak pengurusan akademik perlu mendedahkan kepada pensyarah usuluddin kursus-
kursus dalam bidang sains, politik, sains sosial, astronomi, psikologi, perubatan, moral,
kaunsling dan lain-lain.
RUJUKAN
Al-Quran al-Karim
Jujun, S.Sariasumantri (1990), Ilmu dalam Perspektif Moral, Sosial , dan Politik, cet.
Pertama. Selangor: Dewan Bahasa Dan Pustaka..
Ismail Hj. Ibrahim dan Mohd. Sahri (1994), Ilmu dan Kecemerlangan Dari Perspektif Islam.
Kuala Lumpur: Institut Kefahama Islam Malaysia (IKIM).
Abudin Nata (2005) , Integrasi Ilmu Agama Dan Ilmu Umum. Indonesia: Rajawali Persada.
Mohammad Solikin (2008), Integrasi Ilmu Dan Agama Menurut Ismail Raji al-Faruqi Dan
Koutowijoyo.Indonesia: Universiti Muhamadiyah Surakarta.
Zainal Abidin, Integrasi Ilmu Dan Agama. Indonesi: Pustaka Mizan.
Dr. Aroom Kuswanjono, Integrasi Ilmu Dan Agama Perspektif Filsafat Mull Sadra.
Prof. Omar Hasan Kasute Sr (2009), Epestemologi Islam Dan Integrasi Ilmu Pengetahuan
Pada Universiti Islam (seminar).
Pengilmuan Islam Dan Integrasi Ilmu Dengan Etika Gagasan Kuntowijoyo (makalah).
Prof. Dr. Nakhtiar Effendy (2009), Integrasi Studi Keagamaan Dan Teori Ilmu Sosial.Jakarta.
Drs, H Nurchalish Madjid , Keharusan Pembaharuan Pemikiran Islam Dan Masalah Integrasi
Umat. Indonesia.
Shahrullah Iskandar (2005), Integrasi Ilmu: Sebuah Rekohstruksi Holistik.Bandung: Arasy
Mizan.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 135
PEMBANGUNAN PROTOTAIP SIMULASI BERKOMPUTER PERGERAKAN
TUBUH DAN PEREDARAN DARAH KETIKA SOLAT FARDHU (SOLATSIM)
Nor Azah Abdul Aziz, Syakirah Samsudin, Asmara Alias,
Fadhlina Mohd Razali, Zarima Zakaria
Latifah Adawiyah bt Ahmad Rifaie, Khairunnisa Ramli,
Noor Hafsha Abd. Wahab
Universiti Pendidikan Sultan Idris (UPSI)
Tanjung Malim, Perak
azah@ftmk.upsi.edu.my
Abstrak
Kajian ini bertujuan untuk membina prototaip simulasi berkomputer untuk menunjukkan
pergerakan tubuh dan peredaran darah ketika menunaikan solat fardhu. Koleksi data diambil
dari 51 responden yang merupakan pelajar tahfiz. Pemilihan ini berdasarkan pengkhususan
pelajar tahfiz yang sentiasa bersolat jemaah dan mendampingi Al-Quran di samping
mempelajari ilmu agama yang lain. Data-data terdiri daripada pergerakan dan posisi solat
fardhu dalam bentuk video mahupun imej statik serta kadar tekanan darah dan denyutan
jantung direkodkan sebelum dan selepas solat untuk membina protaip ini. Model ADDIE
digunakan sebagai metodologi untuk membangunkan prototaip. Kajian ini melibatkan
pelbagai bidang seperti Multimedia, Pengajian Islam dan Sains. Hasil kajian adalah
berbentuk perisian simulasi interaktif yang boleh digunakan untuk menambahkan ilmu
pengetahuan tentang solat fardhu secara saintifik.
Kata kunci: solat fardhu, pembangunan prototaip simulasi, pergerakan tubuh, peredaran
darah.
PENDAHULUAN
Solat adalah inti ibadah di dunia. Ia merupakan bukti nyata keimanan dan keIslaman
seseorang di alam realiti. Solat merupakan elemen terpenting dalam syariat Islam
(Misbah Em Majidy, 2009). Allah Taala memerintahkan agar solat dilakukan secara
berjemaah dan memohon pertolongan kepadaNya dengan cara mengerjakan solat
seperti berikut:
Dan dirikanlah kamu akan sembahyang dan keluarkanlah zakat, dan rukuklah kamu semua
(berjemaah) bersama-sama orang-orang yang rukuk.
Surah Al- Baqarah (2):43
Dan mintalah pertolongan (kepada Allah) dengan jalan sabar dan mengerjakan
sembahyang; dan sesungguhnya sembahyang itu amatlah berat kecuali kepada orang-orang
yang khusyuk;
Surah Al- Baqarah (2):45
Solat fardhu adalah merupakan kewajiban yang perlu dilakukan oleh setiap umat Islam lima
kali sehari pada waktu yang berbeza yang telah ditetapkan oleh Allah Taala dan membantu
keupayaan tubuh terutamanya sistem darah dan jantung. Solat juga merupakan terapi
psikologi yang membantu jiwa menjadi lebih tenang dan menghilangkan tekanan perasaan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 136
yang disebabkan oleh pelbagai masalah dalam kehidupan; yang paling signifikan adalah
manusia merasakan semua masalahnya sangat kecil di hadapan Pencipta yang Maha Agung.
Solat juga menghilangkan semua sumber tekanan pada diri manusia apabila berlakunya
perubahan pergerakan dalam solat secara konstan. Ini dikenali sebagai perubahan yang
membawa kepada kerehatan fisiologi yang sangat penting. Fakta Ini adalah bertepatan
dengan sabda Nabi Muhammad s.a.w. yang memerintahkan umatnya bersolat ketika
menghadapi kemarahan dan telah terbukti bahawa solat memberikan kesan yang pantas
terhadap sistem saraf dengan memberi ketenangan dan keseimbangan. Solat juga turut
menjadi penawar kepada insomnia atau penyakit sukar tidur yang disebabkan oleh kegagalan
sistem saraf (Nor Azah Abdul Aziz et. al, 2008).
Muslim yang khusyuk dalam mengamalkan ibadah solat akan merasakan ketenangan jiwa
kerana berkurangnya tekanan darah, kadar denyutan jantung dan respiratori ketika solat .
Motivasi diri yang tinggi dalam kehidupan samada sebagai pelajar mahupun sebagai pekerja
dan mudah bergaul dengan masyarakat persekitaran juga adalah impak dari solat yang
sempurna. Ini kerana ibadah solat menyebabkan setiap anggota tubuh memainkan peranan
masing-masing mengikut pergerakan solat yang spesifik seperti yang diperintahkan oleh
Allah Taala. Setiap pergerakan solat ini juga menyebabkan darah dapat beredar ke seluruh
tubuh dan apabila sujud darah akan beredar ke bahagian otak dan memberikan tenaga kepada
otak untuk menjalankan fungsinya mengawal keseluruhan tubuh. Bacaan-bacaan dalam solat
melindungi fikiran daripada angan-angan atau fikiran lain yang mengganggu solat (Prof.
Akbar Husain, 2006).
Teknologi Maklumat dan Komunikasi (ICT) pula adalah teknologi yang telahpun biasa
digunakan oleh orang Islam masa kini. Walau bagaimanapun keperluan terhadap panduan
secara Islamik tentang penggunaan dan pembangunan ICT masih diperlukan. Salah satu
aspek yang perlu diberi penekanan ialah maklumat yang digunakan sebagai isi kandungan
dalam Teknologi Maklumat dan Komunikasi (ICT). Bagi pembangun yang beragama Islam,
isi kandungan yang dibangunkan perlulah sejajar dengan agama Islam dan pembangunan
ummah. Sejajar dengan agama Islam bermaksud berlandaskan kepada al-Qurn dan hadith
Nabi Muhammad s.a.w. (Aznan Zuhid Saidin & Amran Muhammad, 2008). Oleh itu
pembangunan aplikasi ICT memerlukan suntikan dari perspektif agama Islam khususnya
psikologi spiritual Islam. Ini kerana agama Islam mempunyai hubungan yang erat dengan
psikologi iaitu dengan ilmu jiwa dalam soal pendidikan akhlak dan pembinaan mental serta
spiritual. Kedua-duanya sama-sama bertujuan untuk mencapai kesejahteraan jiwa dan
ketinggian akhlak (supreme morality) (Dr. Moh. Sholeh Imam Musbikin, 2005). Dalam Islam
istilah jiwa dapat diertikan sebagai al-nafs, namun ada juga yang menyamakannya dengan al-
rh (Che Zarrina Saari, 1997). Psikologi dapat diterjemahkan ke dalam bahasa Arab sebagai
ilm al-nafs atau ilm al-rh. Psikologi spiritual Islam dapat disimpulkan sebagai kajian Islam
yang berkaitan dengan aspek-aspek dan perilaku kejiwaan manusia supaya secara sedar dapat
membentuk kualiti diri manusia yang lebih sempurna dan mendapatkan kebahagiaan hidup di
dunia dan di akhirat (Abdul Mujib, M.Ag. & Jusuf Mudzakir, M.Si., 2002). Psikologi
spiritual Islam boleh dilihat dalam empat dimensi diri manusia yang hidup iaitu fizikal,
biologi, kejiwaan (psikologi), sosiokultural dan spiritual. Psikologi spiritual Islam juga
merupakan jalan penyelesaian terhadap masalah jiwa dan pemikiran manusia yang bersifat
rohaniah dengan mengenal diri, penyembahan atau solat kepada Allah Taala dan
pembentukan akhlak dengan berpandukan al-Quran dan hadith (Malik Badri, 1989).
Keunikan pembangunan dalam industri komputer atau ICT ini ialah, ianya seiring menjadi
batu loncatan kepada indsutri yang berkait rapat dengannya. Contohnya jika industri
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 137
komputer berkembang maju, industri berkaitan juga turut berkembang seiring dengan
kemajuannya. Salah satu industri yang berkembang sejajar dengan perkembangan industri
komputer ialah industri perisian simulasi. Apabila perkakasan komputer menjadi lebih hebat,
berteknologi tinggi, lebih tepat, laju dan mudah digunakan perisian simulasi juga mengalami
perkembangan yang sama. Simulasi cuba memaparkan proses sebenar yang berlaku di dunia
nyata. Simulasi diterimapakai secara meluas sebagai alat untuk meramal keupayaan sesuatu
sistem yang kompleks dan diaplikasikan pada kes-kes kecil yang boleh membawa kepada
nilai yang signifikan (C. Dennis Pegden, 2005).
Solat adalah merupakan rukun Islam yang kedua selepas shahadah. Hukum tentang wajib
solat bagi orang-orang yang beriman sememangnya tidak boleh disangkal. Tujuan solat
adalah untuk menghambakan diri kepada Allah Taala biarpun manusia tidak mengetahui
tentang faedah disebalik suruhan ini. Walau bagaimanapun segala suruhan dan tegahan Allah
Taala mengandungi hikmah yang tersembunyi yang adakalanya dapat disingkap oleh hati
manusia dan adakalanya tidak. Kajian ini cuba mensimulasikan pergerakan tubuh dan
perjalanan darah lelaki dan perempuan ketika solat fardhu dan menunjukkan kadar tekanan
darah serta denyutan jantung sebelum dan selepas solat fardhu dalam aplikasi multimedia
interaktif. Multimedia interaktif muncul sekitar tahun 1990an di mana pendidik yang inovatif
telah mula memikirkan apakah implikasi media baru ini jika diaplikasikan kepada
persekitaran pengajaran dan pembelajaran (P&P). Perkembangan teknologi ini membawa
kepada perubahan dalam semua sektor kehidupan samada pendidikan, ekonomi, sosial dan
sebagainya. Institusi pendidikan pula telah melaburkan masa, kewangan dan usaha dalam
penggunaan teknologi ini (Geraldine Torrisi-Steele, 2005).
Berdasarkan kebaikan solat yang begitu tinggi nilainya dari segi spiritual mahupun fizikal,
adalah menjadi suatu tanggungjawab kepada penyelidik agar kebaikan solat ini dapat
dipaparkan kepada masyarakat umum agar bertambah keimanan manusia kepada Allah Taala
dan menyedari keagungan perintahNya. SolatSim dibangunkan berdasarkan koleksi data
tekanan darah dan denyutan jantung, tempoh setiap posisi solat fardhu zuhur yang dilakukan
secara berjemaah, imej responden lelaki dan perempuan untuk menunjukkan posisi solat
fardhu, simulasi darah dan keadaan otot untuk setiap posisi solat fardhu dan nota hasil dari
kajian kesusasteraan penyelidik.
METODOLOGI PEMBANGUNAN
Model ADDIE digunakan untuk pembangunan SolatSim dan disuntik dengan elemen-elemen
psikologi spiritual Islam. Elemen spiritual ini dikenali sebagai maqm dan h l . Maqm
bermaksud tahap atau peringkat yang telah ditempuhi oleh pengamal tasawuf atau ahli sufi
dan h l adalah keadaan yang datang sendiri ke hati, di mana penerima tidak berniat
mendapatkannya kerana ia adalah kurniaan Tuhan. Contoh maqm ialah taubat, kehendak
(irdah), tekad hati (istiqmah), perjuangan spiritual (mujhadah), lapar dan menahan nafsu,
takwa (taqw), warak (wara), zuhud, diam (s amt), syukur, doa (du), zikir (dhikr),
tawakal, sabar dan kejujuran (s idq). Contoh h l ialah seperti yakin, takut (khawf), , malu
(h ay), sedih (h uzn), pengawasan (murqabah), cinta (mah abbah) dan ikhlas (Nor
Azah Abdul Aziz, 2009).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 138
Model ADDIE dan tambahan elemen psiko spiritual Islam yang digunakan dalam
pembangunan SolatSim adalah seperti berikut:
Rajah 1.0 : Model ADDIE
Sumber Model ADDIE: Grafinger, Deborah J. 1998. Basics of Instructional System
Development. INFO-LINE Issue 8803. Alexandria, VA: American Society for Training and
Development.
Terdapat 5 fasa iaitu dalam model ADDIE iaitu Analysis, Design, Development,
Implementation and Evaluation. Setiap fasa yang dilaksanakan akan sentiasa dipantau dan
dinilai. Sekiranya fasa tersebut tidak dapat dilaksanakan dengan baik proses tersebut boleh
diulang sehingga ia dapat disiapkan dengan lengkap.
Fasa analisis yang bermula dengan idea, objektif dan mengenal pasti pengguna sasaran.
Pengguna sasaran adalah masyarakat umum yang ingin mengetahui tentang bacaan, simulasi
darah dan otot serta kebaikan solat dengan melihat pada kadar tekanan darah dan jantung
sebelum dan selepas solat fardhu. Hasil pembangunan adalah dalam bentuk CD interaktif,
animasi berterusan untuk televisyen, laman web untuk promosi dan pengenalan produk.
Koleksi data diambil dari 51 responden yang merupakan pelajar tahfiz dalam lingkungan
umur 18-21 tahun untuk membina perisian ini. Data-data terdiri daripada pergerakan tubuh
dan posisi solat fardhu dalam bentuk video mahupun imej statik dan tekanan darah
direkodkan sebelum dan selepas solat fardhu. Video solat berjemaah ketika solat fardu zohor
direkodkan bagi tujuan mengenalpasti tempoh untuk setiap pergerakan tubuh. Storyboard dan
rajah aliran dibina berdasarkan data-data yang telah diambil. Ketika fasa ini elemen spiritual
yang perlu ditekankan kepada pembangun mahupun penyelidik ialah kehendak (irdah)
dalam mencari ilmu dan analisa dan yakin terhadap idea yang dikemukakan untuk
pembangunan. Irdah atau kehendak adalah permulaan jalan golongan slik dan maqm yang
pertama bagi golongan yang menuju Allah ini. Kehendak mendahului setiap masalah kerana
tanpa kehendak manusia tidak akan melakukan sesuatu apatah lagi berjalan menuju Allah
idea, objektif dan mengenal pasti pengguna sasaran
Elemen spiritual: kehendak (irdah) dalam mencari ilmu
dan analisa dan yakin terhadap idea yang dikemukakan
untuk pembangunan
pembinaan Storyboard
Elemen spiritual: tekad hati (istiqmah), sabar dan jujur
dalam merekebentuk
pengarangan antaramuka,elemen simulasi dikumpul,
disediakan, ditambah skrip pengaturcaraan dan
diintegrasikan
Elemen spiritual: tekad hati (istiqmah), mujhadah dan
pengawasan (murqabah)
menyempurnakan pembangunan dan melakukan pengujian
Elemen spiritual: sabar, jujur, ikhlas, doa (du), tawakal
dan harap (raj)
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 139
Taala. Bagi golongan sufi, kehendak adalah permulaan perjalanan yang bermaksud niat dan
mendahului setiap persoalan (Al-Qushayr, 2004). Kehendak yang kuat ini sangat perlu
diperingkat analisis untuk menjana objektif, idea dan menganalisa kehendak pengguna diikuti
dengan mencari ilmu yang bersesuaian dengan kajian kerana menurut al-Ghazl amalan
adalah hasil dari ilmu, hasil dari usaha hamba-hamba Allah yang kuat, perkara yang paling
berharga bagi orang yang soleh, jalan yang ditempuh oleh mereka yang bertakwa, bahagian
untuk mereka yang mulia, tujuan bagi orang-orang yang berhemah tinggi, pekerjaan mereka
yang berani, pilihan bagi mereka yang waspada dan juga merupakan jalan menuju syurga
(Al-Ghazl, 2006).
Fasa rekabentuk adalah merupakan fasa yang menentukan setiap elemen multimedia
mahupun isi kandungannya adalah menepati objektif kajian sebelum dimasukkan ke dalam
storyboard. Elemen multimedia yang dimasukkan termasuklah teks, grafik, animasi
(simulasi) dan video. Isi kandungan adalah terdiri daripada, Male (maklumat yang
mengandungi grafik, simulasi dan nota ringkas tentang peredaran darah dan pergerakan otot
utama untuk lelaki), Female (maklumat yang mengandungi grafik, simulasi dan nota
ringkas tentang peredaran darah dan pergerakan otot utama untuk perempuan), Research
(maklumat tentang data-data yang didapati dari penyelidikan) , Credit (maklumat tentang
penyelidik dan pembangun) dan Slt Info & Demonstration (maklumat tentang bacaan
dan posisi solat). Ketika fasa ini elemen spiritual yang perlu ditekankan kepada pembangun
mahupun penyelidik ialah tekad hati (istiqmah), sabar dan jujur dalam merekebentuk.
Istiqmah adalah darjat yang menjadikan urusan menjadi baik dan sempurna dan
memungkinkan beroleh manfaat secara tetap dan teratur (Al-Qushayr , 2004). Pembangun
dan penyelidik yang sabar juga akan mendapat darjat yang tinggi di dunia dan di akhirat
kerana golongan yang sabar akan disertai dan ditolong Allah Taala seperti firmanNya:
Sesunguhnya Allah berserta orang-orang yang sabar.
Surah al-Baqarah (2):153
Pembangun dan penyelidik juga perlu mengamalkan sikap jujur dalam fasa ini dengan
memastikan setiap data dan elemen multimedia yang digunakan adalah original dan tiada
sebarang unsur plagiat. Kejujuran adalah satu garis lurus yang mempunyai maksud batin
berupa ikatan atau tanggung jawab, keberanian dan ketabahan untuk menyatakan yang benar
dan mengingkari yang salah. Jujur adalah merupakan identiti manusia yang datang dari dalam
diri manusia iaitu kalbu yang terus menerus mengetuk-ngetuk dan memancarkan cahaya Ilahi
dan juga merupakan bisikan moral yang paling luhur (Drs. H. Toto Tasmara,1999).
Fasa pembangunan adalah merupakan fasa pengarangan di mana antaramuka akan dibina
berdasarkan perancangan di dalam storyboard. Suntingan grafik, animasi, video dan teks
yang mengandungi nota atau arahan dilakukan pada fasa pembangunan ini dengan sistematik
supaya seiring dengan objektif kajian mahupun pembangunan. Pembangunan yang dilakukan
juga perlu seiring dengan masa yang diperuntukkan seperti yang dirancang pada fasa analisis.
Semua elemen multimedia untuk pergerakan tubuh, peredaran darah dan elemen simulasi
dikumpul, disediakan, ditambah skrip pengaturcaraan dan diintegrasikan. Ketika fasa ini,
pakar bidang pembangunan multimedia, biologi dan agama Islam akan memantau dan
menguji perisian yang dibangunkan agar kesilapan boleh diperbaiki di peringkat awal
pembangunan. Ketika fasa ini elemen spiritual yang perlu ditekankan kepada pembangun
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 140
mahupun penyelidik ialah tekad hati (istiqmah), mujhadah dan pengawasan (murqabah).
Tekad hati dan semangat juang (mujhadah) yang jitu amat diperlukan dalam proses
pembangunan yang ruwet. Ini kerana mujhadah yang berterusan akan meresap ke dalam
jiwa untuk mendapatkan pengetahuan hakiki (marifat) dan mendapat petunjuk (hud)
kebenaran seperti firman Allah Taala(Drs. H. Toto Tasmara,1999):
Dan orang-orang yang berjihad untuk (mencari) keredhaan Kami,
benar-benar akan Kami tunjukkan kepada mereka jalan-jalan Kami.
Surah al-Ankabt (29): 69
Murqabah menurut bahasa adalah pengawasan atau pemeriksaan (Mufida Masum, 2004).
Sesungguhnya Allah Taala mengawasi segala sesuatu yang dilakukan oleh manusia mahupun
dalam pembangunan dan penyelidikan seperti firmanNya:
Dan Allah Maha Mengawasi segala sesuatu
Surah al-Ahzab (33): 52
Fasa implementasi adalah kesinambungan fasa pembangunan, di mana pembangunan cuba
dilakukan dengan sempurna setelah memperbaiki segala ralat yang berlaku samada dari segi
penggunaan skrip pengaturcaraan, elemen-elemen multimedia yang diintegrasikan dan isi
kandungan yang digunakan. Pada fasa ini produk bersedia untuk diuji dan disebarkan. Fasa
penilaian atau fasa pengujian pula adalah merupakan proses yang sistematik untuk
menentukan kualiti dan keberkesanan rekabentuk intruksi dan produk akhir. Penilaian adalah
merupakan aktiviti berterusan pada setiap fasa dalam model ADDIE. Proses penilaian
mengandungi dua bahagian iaitu formatif dan sumatif. Penilaian formatif adalah penilaian
pada setiap fasa yang mengenal pasti kualiti dan keberkesanan pada setiap fasa tersebut.
Penilaian formatif ini melibatkan pengumpulan maklumat ketika fasa analisis dan proses
rekabentuk yang memfokuskan tentang usaha yang dilakukan menepati objektif, mengenal
pasti kekangan atau masalah, menambah peluang penambahbaikan atau idea baru yang tidak
dijangka, mengenal pasti pengubahsuaian dan pembetulan untuk membantu memastikan
kejayaan sesuatu projek. Penilaian sumatif adalah peringkat pengujian terhadap kriteria
yang berkaitan dengan perisian SolatSim di mana ianya memberi peluang kepada penyelidik
dan pembangun untuk mendapat maklumbalas pengguna terhadap keupayaan, kesesuaian dan
penerimaan produk serta menilai sejauh mana pembelajaran berlaku terhadap isi
kandungannya.. Penilaian sumatif ini adalah instruksi yang bersesuaian untuk mendapatkan
analisis lengkap dan maklumbalas pengguna. Penilaian sumatif juga boleh mengukur sejauh
mana maklumat atau ilmu pengetahuan yang dimiliki oleh SolatSim mampu sampai kepada
pengguna, hasil pembelajaran pengguna, faktor kos dan penerimaan pengguna untuk tujuan
pemasaran dan penyebaran SolatSim. Ketika fasa implementasi dan penilaian ini, elemen
spiritual yang perlu ditekankan kepada pembangun mahupun penyelidik ialah sabar, jujur,
ikhlas, doa (du), tawakal dan harap (raj). Sikap dan perasaan sabar, jujur, ikhlas perlu
sentiasa berada di dalam hati pembangun mahupun penyelidik ketika melakukan proses
implementasi dan pengujian. Ini kerana terdapat ralat yang perlu diperbetulkan dari semasa
ke semasa untuk penilaian formatif dan sumatif. Berdoa (du), bertawakal dan berharap
(raj) kepada Allah Taala agar pembangunan dapat disiapkan dengan jayanya serta berjaya
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 141
memperbaiki setiap kesalahan adalah sandaran yang perlu dalam setiap jiwa pembangun dan
penyelidik.
HASIL PENYELIDIKAN & PENGUJIAN AWAL
Perisian multimedia interaktif SolatSim mengandungi 5 topik utama iaitu Male, Female,
Research, Credit dan Slt Info & Demonstration seperti yang dipaparkan pada rajah
2.0 berikut :
Rajah 2.0: Menu Utama SolatSim
Butang 1 (Male) pada menu utama adalah butang navigasi untuk topik Perjalanan Darah &
Pergerakan Otot Lelaki. Butang 2 (Female) pula adalah butang navigasi untuk topik
Perjalanan Darah & Pergerakan Otot Perempuan. Butang 3 (Research) adalah butang navigasi
untuk topik Kajian Perjalanan Darah & Pergerakan Otot. Butang 4 (Credit) adalah butang
navigasi untuk topik Kredit dan butang 5 (Slt Info & Demonstration) adalah butang
navigasi untuk topik Info & Demonstrasi Solat.
Topik Perjalanan Darah & Pergerakan Otot Lelaki dan topik Perjalanan Darah & Pergerakan
Otot Perempuan mengandungi simulasi darah dan pergerakan otot utama ketika solat fardhu
dibantu dengan grafik posisi solat serta nota kecil untuk menambah ilmu pengetahuan
pengguna. Kadar tekanan darah dan denyutan jantung yang direkodkan bacaannya sebelum
dan selepas solat fardhu juga turut dipaparkan untuk setiap waktu solat fardhu.Tempoh masa
setiap posisi solat juga turut dipaparkan untuk solat zuhur. Topik Kajian Perjalanan Darah &
Pergerakan Otot pula memaparkan isi kandungan khusus tentang penyelidikan yang
dilakukan. Topik ini mengandungi abstrak, latar belakang kajian, metodologi, jadual dan graf
data tekanan darah dan kadar denyutan jantung yang direkodkan sebelum dan selepas solat
fardhu. Bahagian Kredit pula memaparkan barisan penyelidik dan sumber dana penyelidikan.
Topik Info & Demonstrasi Solat mengandungi mengandungi maklumat tentang bacaan (teks
dan audio) untuk setiap posisi solat, video solat zuhur berjemaah dan Maklumat tentang
Solat Secara Autoplay. Contoh antaramuka SolatSim adalah seperti berikut:
1
2
3
4
5
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 142
Rajah 3.0: Menu Perjalanan Darah & Pergerakan Otot Lelaki.
Butang 1 (blood circulation) pada rajah 3.0 perlu diklik sekiranya pengguna ingin
melihat perjalanan darah sewaktu solat fardhu dan butang 2 (muscle condition) untuk melihat
pergerakan otot utama sewaktu solat fardhu bagi lelaki. Sekiranya pengguna klik pada
butang 1 (blood circulation), antaramuka yang menngandungi posisi solat yang boleh dipilih
secara interaktif akan dipaparkan seperti rajah 4.0.
1
2
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 143
Rajah 4.0: Blood Circulation
Pengguna perlu klik gambar Ruk & Tamaninah untuk melihat simulasi aliran darah yang
terlibat sewaktu rukuk. Seterusnya, pengguna perlu klik pada untuk melihat simulasi
tersebut secara terperinci seperti 3.1. Pengguna juga perlu klik pada A untuk melihat nota
seperti 3.2 pada rajah 5.0. Pengguna yang ingin melihat imej yang lebih besar perlu klik pada
B seperti 3.3. pada rajah 6.0.
Rajah 5.0: Ruk & Tamaninah
Rajah 6.0: Simulasi Aliran Darah untuk Tangan
3
3.1
A B
3.2
3.3
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 144
Rajah 7.0: Simulasi Pergerakan Otot untuk Tangan
Rajah 7.0 menunjukkan paparan antaramuka keadaan otot di mana pengguna perlu klik pada
gambar Ruk untuk melihat pergerakan otot-otot yang terlibat sewaktu rukuk. Seterusnya,
pengguna perlu klik pada untuk melihat pergerakannya secara terperinci seperti 3.1.
Pengguna juga perlu klik pada A untuk melihat nota seperti yang dipaparkan pada 3.2 rajah
8.0. Pengguna yang ingin melihat imej yang lebih besar perlu klik pada B seperti 3.3 pada
rajah 9.0.
Rajah 8.0: Nota Simulasi Pergerakan Otot
Rajah 9.0: Paparan Besar Simulasi Pergerakan Otot
3.2
3.3
A
B
3
3.1
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 145
Rajah 10.0: Antaramuka Credit
Rajah 10.0 menunjukkan paparan antaramuka Credit yang mengandungi maklumat para
penyelidik yang terlibat dan sumber dana penyelidikan. Rajah 11.0 pula menunjukkan
paparan jadual dan graf keputusan tekanan darah sebelum dan selepas solat fardu bagi lelaki
dan perempuan.
Rajah 11.0: Antaramuka Research
Rajah 12.0 memaparkan antaramuka Solat Info.& Demonstration yang mengandungi
maklumat bacaan (teks dan audio) untuk setiap posisi tubuh ketika solat fardhu secara
interaktif dan autoplay serta video solat zuhur berjemaah.
.
Rajah 12.0: Antaramuka Solat Info.& Demonstration
Borang soal selidik untuk pengujian awal sebelum ujian formatif yang sebenar telah
diberikan kepada 52 pelajar Ijazah Sarjana Muda Pendidikan Sains (Biologi) semester 4 sesi
2009/2010 yang merupakan pelajar tahun 2 di Universiti Pendidikan Sultan Idris. Pelajar ini
dipilih berdasarkan pengetahuan dan penggunaan aplikasi perisian biologi dalam kursus yang
dipelajari di peringkat Ijazah Sarjana Muda ini. Soal selidik mengandungi Bahagian A dan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 146
Bahagian B. Bahagian A mengandungi maklumat latar belakang pelajar. Manakala, bahagian
B pula mengandungi soalan berkaitan Pembangunan Prototaip Simulasi Berkomputer
Pergerakan Tubuh dan Peredaran Darah Ketika Solat Fardhu (SolatSim). Pengujian awal ini
tidak melibatkan penggunaan komputer untuk setiap responden. Responden ditunjukkan hasil
pembangunan SolatSim dengan menggunakan satu komputer dan projektor di hadapan bilik
kuliah sahaja. Hasil dari pengujian ini untuk bahagian B adalah sepertui jadual di bawah:
Rekabentuk Antaramuka Peratus (%) Yang Bersetuju
Penggunaan teks yang bersesuaian 44%
Penggunaan grafik yang sesuai. 90%
Penggunaan animasi yang bersesuaian. 96%
Masa untuk perisian bertindak balas (grain
size) adalah cepat.
77%
Jadual 1.0: Hasil Soal Selidik Rekabentuk Antaramuka
Isi Kandungan Peratus (%) Yang Bersetuju
Maklumat yang diberikan terlalu sedikit 58%
Maklumat adalah sukar difahami oleh
pengguna.
50%
Maklumat yang disampaikan tepat. 81%
Maklumat boleh diaplikasikan dalam
kehidupan pengguna
94%
Maklumat dikaitkan dengan pengetahuan
sedia ada pengguna.
81%
Maklumat disusun dengan teratur. 73%
Bahasa penyampaian mudah difahami. 67%
Tiada kesilapan ejaan. 92%
Jadual 2.0: Hasil Soal Selidik Isi Kandungan
Keseluruhan Peratus (%) Yang Bersetuju
Perisian ini menarik. 75%
Perisian ini mudah digunakan. 83%
Kandungan perisian adalah bersesuaian. 81%
Kandungan perisian membantu guru. 77%
Kandungan perisian membantu pelajar. 77%
Kandungan perisian membantu ibu bapa. 75%
Jadual 3.0: Hasil Soal Selidik Keseluruhan
Cadangan dan komen responden untuk penambahbaikan pembangunan adalah seperti
lampiran.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 147
PERBINCANGAN
Proses pembangunan SolatSim masih diperingkat penilaian formatif setelah penambahbaikan
dilakukan berdasarkan dapatan komen dan cadangan pengujian awal seperti yang dipaparkan
di atas dan di bahagian lampiran. Hasil ujian menunjukkan pada bahagian Rekabentuk
Antaramuka seperti jadual 1.0 menunjukkan, masa untuk perisian bertindak balas (grain size)
perlu dipercepatkan memandangkan hanya 77% pengguna yang bersetuju dengan item ini
dan penggunaan teks juga perlu ditukar atau dibesarkan saiznya memandangkan hanya 44%
pengguna yang bersetuju dengan teks yang dipaparkan pada SolatSim. Pada bahagian Isi
Kandungan seperti jadual 2.0 menunjukkan maklumat perlu ditambah dan dipermudahkan,
susun atur maklumat juga perlu dikemaskini supaya boleh difahami oleh pengguna
memandangkan peratusan yang rendah di antara 50%-67%. Pada bahagian isi Keseluruhan
seperti jadual 3.0 menunjukkan perisian SolatSim ini menarik, mudah digunakan dan
membantu guru pelajar dan ibu bapa pada tahap 75%-83%. Penambahbaikan telah dilakukan
dari segi simulasi setiap posisi, nota kecil diperkemas untuk memberikan lebih maklumat
kepada pengguna, penggunaan audio ditambah, arahan dimurnikan supaya lebih jelas, teks
dan label dikemaskan supaya lebih informatif dan setiap perubahan dilakukan dengan
merujuk semula kepada objektif pembangunan SolatSim.
MAKLUMAN
Dana Penyelidikan: FRGS/KPT 05-02-04-07
RUJUKAN
Abdul Mujib, M.Ag. & Jusuf Mudzakir, M.Si. (2002), Nuansa-Nuansa Psikologi Islam, c. 2.
Jakarta: PT RajaGrafindo Persada.
Aznan Zuhid bin Saidin & Amran Muhammad (2008). Ayt (signs) in the Qurn as a basis
for information and content development in ICT. International Seminar on Islamic Science &
Technology INSIST08 Proceeding. Organized by: Centre for Islamic Studies and Social
Development & Space UTM.
Che Zarrina Saari (1997), Al-Ghazls Views On The Heart,The Spirit and The Soul : A
Comparison Between Ihya Ulum Al-Din and Al-Risalah Al-Laduniyyah, Jurnal
Usuluddin, Bil. 7.
Dr. Moh. Sholeh Imam Musbikin (2005), Agama Sebagai Terapi : Telaah Menuju Ilmu
Kedokteran Holistik. Yogyakarta: Pustaka Pelajar.
Drs. H. Toto Tasmara (1999), Dimensi Doa dan Zikir, Meyelami Samudra Qolbu Mengisi
Makna Hidup. Yogyakarta: Pt. Dana Bhakti Prima Yasa
Malik Badri (1989), Konflik Ahli Psikologi Islam. Fadlullah Wilmot (terj), Petaling Jaya: IBS
Buku Sdn Bhd.
Misbah Em Majidy (2009). Menyukat Solat Diri. Petaling Jaya : Kemilau Publika Sdn. Bhd.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 148
Molenda, M. (2003). In Search of the Elusive ADDIE Model. In Performance improvement,
42(5), 34. Akses pada 30 Mac 2010, dari http://www.indiana.edu/~molpage/In%20Search%
20of% 20Elusive% 20 ADDIE.pdf#search=%22ADDIE%20Model%20%2Bhistory%22%29
Mufida Masum (2004), al-Manhal Kamus Arab-Melayu. Selangor: Cresent News
Nor Azah Abdul Aziz (2009). Pengawalan Diri Ke Atas Pelayaran Laman Web Pornografi
Pada Peringkat Remaja di Lembah Klang, Malysia Dari Sudut Psikospiritual Islam (Tesis
Ph.D.), Jabatan Pengajian Islam, Akademi Pengajian Islam, Universiti Malaya).
Nor Azah Abdul Aziz, Syakirah Samsudin, Asmara Alias, Fadhlina Mohd Razali, Zarima
Mohd. Zakaria, Siti Ruhaini Anuar (2008). The Computerized Simulation Of The Bodily
Movement And Blood Circulation System During The Performance Of Obligatory Prayers.
International Seminar on Islamic Science & Technology INSIST08 Proceeding. Organized
by: Centre for Islamic Studies and Social Development & Space UTM.
Pegden, C. D. (2005). Future Directions in Simulation Modeling. In Proceedings of the 37
th
conference on Winter simulation (p. 4-5). The ACM Digital Library.
Prof. Akbar Husain (2006). Islamic Psychology Emergence of a New Field . New Delhi:
Global Vision Publishing House.
Strickland, A.W. (2006), ADDIE, Idaho State University College of Education Science, Math
& Technology Education. Akses pada 29 Jun, 2006, dari http://ed.isu.edu/addie/index.html.
Torrisi-Steele, G. (2005). Toward Effective Use of Multimedia Technologies in Education
dalam Interactive Multimedia in Education and Training, ed. Sanjaya Mishra & Ramesh C.
Sharma. Hershey: Idea Group Publishing.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 149
Lampiran Komen Cadangzan dari Soal Selidik
Bahagian B
A. Rekabentuk Antaramuka (Interface Design)
1. Teks diletakkan di tempat yang sesuai
2. Teks kurang jelas.
3. Besarkan saiz teks.
4. Tambahkan teks.
5. Teks terlalu kecil.
6. Saiz tulisan yang sangat kecil menyukarkan untuk membaca.
7. Terlalu kecil
8. Quite good but less clears about the words in diagram.
9. Lebih banyakkan pergerakan.
10. Buat anak panah bagi jelas.
11. Tambahkan unsur grafik.
12. Perlu penerangan yang lebih jelas.
13. Animasi untuk pergerakan lutut sewaktu rukuk tidak tepat.
B. Kandungan
1. Not really understand it.
2. Nota mestilah dibesarkan.
3. Biasa tapi good. Tapi tidak didalami.
4. Maklumat tidak jelas.
5. Labelkan. Aliran darah tidak berapa nampak.
6. Penerangan perlu lebih spesifik.
7. Setiap struktur badan, organ perlu dilabel.
8. Setiap grafik perlu ada penerangan.
C. Keseluruhan
1. Need to improve again.
2. Tambahkan sound effect.
3. Tambah suara orang untuk penerangan.
4. Gunakan simulasi audio.
5. Menarik namun maklumat tidak jelas.
2. Cadangan Penambahbaikan SolatSim
1. Penambahan Sound effect untuk penerangan.
2. Tambahkan sound (muzik) yang menarik, mendamaikan dan kesan bunyi yang
bersesuaian supaya lebih menarik.
3. Penggunaan audio supaya lebih mudah difahami. Guna suara untuk menerangkan.
4. Perlu letak suara, baru boleh faham dengan animasi itu.
5. Perlu ada penerangan.
6. Penerangan boleh diberikan dengan menggunakan gambar dan audio.
7. Penerangan lebih teratur.
8. Tajuk adalah amat menarik. Namun penyampaian kurang jelas dan tidak sampai.
Diharapkan maklumat lebih jelas, lebih banyak penerangan dalam bentuk tulisan.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 150
9. Overall, bagus tetapi kurang penerangan.
10. Masukkan suara untuk menjelaskan segala pergerakan.
11. Penerangan perlu lebih mendalam.
12. Perlu lebih banyak audio yang menerangkan keseluruhan.
13. Mungkin boleh masukkan audio (lagu) yang slow untuk menarik perhatian.
14. Penerangan audio juga diperlukan supaya dapat difahami apa yang cuba
disampaikan.Tiada label gambarajah. Koswer akan menjadi menarik dengan
penambahbaikan.
15. Masukkan audio dalam menyatakan sesuatu pergerakan dan apa yang berlaku.
16. Perlukan suara untuk menarik penonton.
17. Audio yang bersesuaian perlu disertakan.
18. Guna aplikasi audio supaya mempunyai penerangan tentang animasi dan mudah
difahami.
19. Tambahkan sound effect untuk hasilkan paparan yang lebih menarik.
20. Audio perlu ada.
21. Arahan kurang jelas.
22. Audio perlu ditambahkan.
23. Tambahkan sound effect yang mendamaikan.
24. Perlu ada suara latar
25. Perlu ada penerangan dari suara latar.
26. Masukkan bunyi pada part-part yang sepatutnya.
27. Sertakan sekali rakaman suara dan significance of this study.
28. Perlu memasukkan anak panah atau penunjuk aliran darah untuk penambahan kefahaman.
29. Tiada label. (ada yang tiada label, lebih baik labelkan untuk setiap slide yang ada
gambar.)
30. Besarkan label.
31. Tambahkan label yang jelas.
32. Peredaran darah kurang jelas, salur darah tidak dilabel yang terdeoksigen dan oksigen.
33. Perlu ada label yang menunjukkan peredaran darah.
34. Tambah label.
35. Gambarajah lebih menarik sekiranya ada label.
36. Pergerakan darah tidak nampak. Sepatutnya perlu ada label pada setiap proses.
37. Nota tentang pergerakan otot perlu dalam bentuk yang dapat dibaca. Letakkan label.
Keseluruhannya koswer ini menarik.
38. Perlu ada label.
39. Label struktur badan.
40. Setiap gambar perlu ada label.
41. Animasi dan gambar yang digunakan kurang menarik.
42. Animasi kurang jelas.
43. Kurangkan animasi dalam satu slide.
44. Setiap animasi yang ditunjukkan perlu diterangkan secara tepat dan ringkas.
45. Setiap animasi disediakan dengan penerangan mengenai setiap pergerakan tersebut.
46. Warnakan supaya lebih menarik.
47. Saiz gambar dan teks perlu dibesarkan supaya pengguna dapat melihat dengan lebih jelas.
48. Saiz grafik manusia perlu diperbesarkan.
49. Gunakan warna yang dapat menarik perhatian.
50. Gambar solat perlu ditukar kepada video pergerakan untuk pengetahuan lebih pada yang
bukan muslim.
51. Perlu ditambah background yang lebih menarik dan ceria.
52. Menggunakan warna yang lebih menarik.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 151
53. Gambar kurang menarik.
54. Gambar perlu lebih menarik.
55. Saiz grafik manusia perlu diperbesarkan.
56. Diagram aliran darah keseluruhan badan perlu dibesarkan.
57. Besarkan tulisan nota.
58. Saiz diperbesarkan.
59. Maklumat ditambah.
60. Sertakan hadis-hadis dan dalil-dalil tentang kebaikan solat.
61. Hasilkan koswer yang menarik dengan penggunaan font yang menarik.
62. Maybe can relate how the muscle function when they are solat. Please brief how the
muscle and what the main title actually.
63. Masukkan faedah-faedah atau kelebihan setiap pergerakan dalam solat.
64. Cuba menggabungkan semua proses yang berlaku secara keseluruhan untuk memberi
gambaran yang lebih jelas.
65. Indicator kena tambah.
66. Maklumat yang diberikan tidak terperinci.
67. Lebihkan maklumat mengenai kajian yang dilakukan. Why it happen?
68. Perlu tahu nama otot yang berkaitan.
69. Tak dapat nak kaitkan penggunaan koswer dalam aplikasi hidupan harian. (Objektif tidak
jelas.)
70. Koswer yang menarik untuk dijadikan further study.
71. Objektif kajian kabur.
72. Pergerakan darah tidak jelas.
73. Penerangan ketika tunjuk video. Penerangan tidak mendalam. Jadi, tidak berapa faham.
Tajuk sangat menarik.
74. Banyakkan maklumat tentang manfaat jika muscle itu berfungsi. Boleh tambahkan lagi
dengan video atau suara yang menerangkan.
75. Buat video simulation sekali dengan penerangan.
76. Boleh kaitkan dengan vibration yang terhasil oleh badan.
77. Ion-ion yang terhasil atau terlibat sepanjang solat berjemaah atau solat bersendirian.
78. Buat perbandingan antara solat berjemaah dengan solat berasingan.
79. Terangkan prosedur digunakan untuk kumpul data.
80. Sertakan hadis-hadis dan dalil-dalil tentang solat.
81. Tambahkan aplikasi movie maker supaya lebih short dan smooth. Tambahkan
pengalaman responden sebagai bukti.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 152
KEMUDAHCAPAIAN PERISIAN PENDIDIKAN MULTIMEDIA
UNTUK PENGGUNA MASALAH PENDENGARAN
Siti Zaharah Mohid
1
, Nor Azan Mat Zin
2
1
Fakulti Teknologi Sains dan Informasi (FTSI)
Kolej Universiti Islam Antarabangsa Selangor
zaharahm@kuis.edu.my
2
Fakulti Teknologi dan Sains Maklumat(FTSM)
Universiti Kebangsaan Malaysia
43600 Bangi, Malaysia
azan@ftsm.ukm.my
Abstrak
OKU (Orang Kurang Upaya) masalah pendengaran terutama kanak-kanak, biasanya akan
menghadapi masalah dalam menguasai bahasa percakapan atau penulisan seterusnya
menghadapi masalah dalam komunikasi dengan masyarakat sekeliling. Masih terdapat
kekurangan material untuk membantu komuniti pekak dalam proses pengajaran dan
pembelajaran bagi meningkatkan kualiti hidup yang lebih baik. Kemudahcapaian kepada
rekabentuk perisian pendidikan multimedia akan dapat memberi banyak faedah kepada ramai
pengguna dari pelbagai latarbelakang dan keupayaan termasuk OKU masalah pendengaran.
Kertas kerja ini membincangkan kajian awal terhadap keperluan merekabentuk perisian
pendidikan multimedia untuk meningkatkan kemudahcapaian (accessibility) orang kurang
upaya masalah pendengaran atau pekak.
Keywords: kemudahcapaian, rekabentuk perisian, multimedia, oku masalah pendengaran
1. Pengenalan
Ledakan dan kemajuan teknologi maklumat telah menjanjikan setiap individu kepada capaian
maklumat dan pengetahuan yang lebih luas, jaringan komunikasi kepada lebih ramai orang
dan kemudahan di dalam dunia pendidikan dan kerjaya. Peluang ini turut memberi kelebihan
kepada masyarakat OKU (orang kurang upaya). Telah banyak laporan menyatakan bahawa
teknologi maklumat termasuk internet mempunyai kesan penting di dalam kehidupan mereka
(DO-IT, 2004; Hasselbring & Glaser, 2000).
Di dalam bidang pendidikan, konsep tiada diskriminasi juga termasuk kebolehan semua
orang untuk mendapat hak dan peluang yang sama di dalam pendidikan tanpa mengira kelas
sosial, etnik, latarbelakang atau ketidakupayaan (disabilities) (Klironomos et al, 2005). Oleh
itu, semua orang di dalam masyarakat mempunyai hak yang sama untuk mendapat peluang
pendidikan. Di dalam konteks ini, komuniti pekak juga mempunyai hak yang sama untuk
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 153
menggunakan alat bantu pendidikan (educational tool), termasuk yang menggunakan konsep
ICT (ICT based tools) atau perisian berbantukan komputer (PBK).
Justeru itu, usaha untuk merekabentuk perisian pendidikan multimedia yang juga boleh
dicapai oleh pengguna masalah pendengaran selain oleh pengguna awam seperti keluarga
dan rakan-rakan oku pekak merupakan satu keperluan yang dapat meningkatkan kualiti hidup
komuniti ini. Kajian ini menggunakan konsep rekabentuk untuk semua atau Design for All
primes concept, di mana perisian pendidikan dibangunkan menggunakan prinsip-prinsip
metodologi yang mengaplikasikan pertuturan kiu sebagai medium komunikasi alternatif
dikalangan oku masalah pendengaran dan masyarakat umum.
2. Komuniti Pekak
Pekak atau masalah pendengaran adalah disebabkan oleh kerosakan di bahagian telinga yang
menghalang pendengaran. Oyer et al. (1994) mendefinasikan darjah atau tahap kehilangan
pendengaran bergantung kepada tahap kerosakan:
- PROFOUND (91 dBHL ke atas) Kehilangan pendengaran secara menyeluruh.
Tak dapat dibantu dengan alat bantu dengar.
- SEVERE (80 90 dBHL). Kehilangan pendengaran yang bermakna alat bantu
dengar adalah satu kemestian.
- MODERATE (45 79 dBHL) Bermasalah untuk mendengar bunyi yang kuat.
- MILD (30 44 dBHL) Bermasalah untuk mendengar pertuturan biasa.
- SLIGHT (15 29 dBHL) Kesukaran mendengar bunyi bisikan dan perbualan di
khalayak ramai.
Menurut statistik yang dikeluarkan oleh Jabatan Kebajikan Masyarakat, terdapat lebih 30,000
orang pekak berdaftar berbanding 24 juta populasi penduduk di Malaysia. Masalah utama
oku pekak (masalah pendengaran) adalah berkomunikasi dengan orang sekeliling. Bahasa
Isyarat Malaysia (BIM) atau Malaysian Sign Language adalah bahasa yang meluas digunakan
dikalangan orang pekak juga sebagai medium untuk berkomunikasi dengan orang sekeliling.
Komuniti pekak sangat bergantung kepada jurubahasa isyarat untuk berkomunikasi dan
mendapatkan maklumat (Siew et al. 2007).
Namun begitu, tidak semua orang pekak (terutama kanak-kanak) tahu menggunakan bahasa
isyarat. Ini kerana tidak ada satu versi standard untuk bahasa isyarat dan pergerakan yang
rumit mungkin amat sukar untuk menggambarkan sesuatu bahasa yang saintifik atau tinggi
(Burgstahler, 2008). Kemampuan mereka menguasai bahasa isyarat dan sejauh mana bahasa
isyarat membantu mereka menjalani kehidupan seperti manusia normal masih menjadi
persoalan. Ini kerana mereka sering menghadapi masalah ketika berurusan di kaunter-
kaunter jabatan kerajaan atau bank, mendapatkan rawatan di hospital, memberi keterangan di
balai polis dan sebagainya kerana tidak ramai petugas dan orang awam yang boleh berbahasa
isyarat.
Pertuturan Kiu adalah medium alternatif untuk berkomunikasi dengan orang pekak. Hanya
sekelompok kecil komuniti pekak di Malaysia yang menggunakan pertuturan kiu sebagai
medium komunikasi. Pertuturan Kiu diperkenalkan oleh Dr R. Orin Cornett pada tahun 1967
daripada Kolej Gallaudet, Washington. Ia adalah komunikasi mode visual yang
menggunakan bentuk tangan dan posisi tertentu serta pergerakan bibir di mana setiap suku
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 154
kata yang dituturkan itu boleh dicam dengan jelas melalui penglihatan dan pendengaran
(National Cued Speech Association, 2006). Sehingga Oktober 1993, Pertuturan Kiu telah
diadaptasi kepada 56 bahasa dan dialek utama di dunia. Pertuturan Kiu telah disesuaikan
untuk digunakan dengan Bahasa Melayu dan digunakan di dalam projek rintis HI CHILD
(Hearing Impaired Childrens Home-based Initiative for Language Development) pada 1988.
Literasi adalah keupayaan individu untuk membaca dan menulis tetapi bagi oku pekak, ia
juga bermaksud keupayaan untuk bercakap atau bertutur. Bagi manusia normal, bahasa
percakapan dan penulisan sangat mudah dipelajari kerana ia diajar di sekolah dan masyarakat
sekeliling (Salawaati, 2009). Malangnya kanak-kanak pekak tidak mempunyai capaian
(inaccessibility) kepada bahasa pertuturan (bahasa lisan) dan kurang atau tiada pendedahan
kepada bahasa isyarat (Goldin-Meadow & Mayberry, 2001). Justeru itu, kanak-kanak pekak
biasanya menghadapi perkembangan bahasa yang lambat berbanding akan-rakan mereka
yang boleh mendengar (Mayer, 2007). Bagi OKU pekak, mereka perlu diajar cara bertutur
yang betul bagi membolehkan komunikasi dengan keluarga dan masyarakat.
Pertuturan Kiu Bahasa Melayu (PKBM) adalah satu kaedah bagi kanak-kanak pekak
memahami bahasa lisan (pertuturan/penulisan) yang berbeza daripada bahasa isyarat (gerak
isyarat) di rumah dengan cara yang mudah dan semulajadi. Kaedah ini membolehkan bahasa
pertuturan dibaca secara bibir dan isyarat tangan tanpa sebarang kesamaran. Lapan bentuk
tangan mewakili konsonan manakala terdapat tiga posisi (leher, dagu dan sisi) untuk bunyi-
bunyi vokal (Tan, 1999). Rajah 1 menunjukkan PKBM.
Rajah 1 : Pertuturan Kiu Bahasa Melayu
Pusat Pertuturan Kiu diletakkan di bawah Persatuan Kebangsaan Pekak Malaysia (PKPM),
sebuah badan bukan kerajaan yang bertanggungjawab untuk memperbaiki kualiti kehidupan
masyarakat pekak di Malaysia. Di sini, kanak-kanak peringkat tadika dilatih mengeluarkan
suara dan mengkiu. Pelajar yang menggunakan kaedah ini mampu bertutur, membaca,
menulis juga mengira setanding kanak-kanak seusia mereka yang normal (Tan, 1999).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 155
Terdapat banyak kajian yang menunjukkan keberkesanan dan kejayaan pertuturan kiu di
dalam pelbagai bidang. (Cued Speech Association UK, 2009 ; National Cued Speech
Association, 2006). Hasil kajian menunjukkan mengiu dengan kanak-kanak secara tepat
(betul) dan konsisten boleh membantu pembangunan bahasa, komunikasi dan literasi
(Franklin, 2006).
3. Perisian Pendidikan
Perisian pendidikan, e-learning, teknologi pendidikan berasaskan komputer atau
pembelajaran berbantukan komputer (PBK) adalah teknologi yang mampu meningkatkan
peluang pendidikan kepada ramai pelajar. Menurut Lynch et al. (2000), pembelajaran
berbantukan komputer ialah komputer digunakan untuk mengajar atau mengasah sesuatu
kemahiran di mana ia membawa banyak manfaat kepada pelajar antaranya:
mempercepatkan proses pembelajaran,
dapat meningkatkan daya ingatan,
berinteraksi dengan komputer secara aktif,
fleksibiliti dalam pembelajaran; pelajar yang menentukan cara menggunakan
bahan PBK,
pembelajaran kendiri.
Kajian lain pula mendapati penggunaan teknologi multimedia dapat meningkatkan motivasi
pelajar, meningkatkan self-esteem dan meningkatkan pencapaian pelajar (Xiaoming Li &
Atkins 2004). Ramai penyelidik telah mengkaji pelbagai ciptaan dan produk untuk
meningkatkan literasi dikalangan palajar masalah pendengaran. Kewujudan Computer-
Assisted Language Learning (CALL) telah menggalakkan peningkatan proses pembelajaran
bahasa (Korat & Shamir, 2007). Selain daripada itu, penggunaan visual cues telah dibuktikan
memberi manfaat kepada pembelajaran bahasa dikalangan pelajar masalah pendengaran
(Gentry et al., 2005;Fung et al., 2005). Buku bergambar dan bahan bacaan bergambar sangat
membantu pelajar pekak pada tahap kerosakan severe hingga profound terutama ketika tahap
awal perolehan bahasa (language acquisition period) (Bond et al.,1994). Kekurangan
pendengaran telah memaksa pelajar pekak untuk memaksimakan visual cues dengan
menghubungkan dan mengaitkan isyarat dan teks. Bagaimanapun, beberapa pertimbangan
tambahan perlu diberi perhatian sewajarnya di dalam melaksanakan visual cues pembelajaran
berbantukan komputer. Kim et al. (2008) mendapati bahawa bagi kanak-kanak pekak,
animasi dianggap fitur yang sangat menyeronokkan di dalam pembelajaran.
Menurut Siew et al. (2007), masih terlalu kurang bahan bantuan pengajaran dan pembelajaran
untuk membantu komuniti pekak di Malaysia di dalam proses pembelajaran. Masih banyak
usaha perlu dilakukan didalam menerbitkan dan membangunkan material pengajaran dan
pembelajaran untuk komuniti pekak diperlukan untuk membantu mengurangkan jurang
komunikasi antara mereka dan masyarakat umum. Tinjauan umum penyelidik di internet,
temubual bersama guru-guru dan ibu bapa mengesahkan penemuan ini. Terlalu sukar
mencari perisian kursus di dalam Bahasa Melayu untuk komuniti pekak di Malaysia.
Terdapat penerbitan berbentuk CD-ROM namun ia adalah dalam bentuk video. Jadual 1
menunjukkan beberapa penerbitan CD-ROM untuk pembelajaran dan pengajaran komuniti
pekak di Malaysia.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 156
Jadual 1: Penerbitan bahan untuk pembelajaran dan pengajaran komuniti pekak di Malaysia
Tajuk Kandungan Penerbit
Pertuturan Kiu
Bahasa Melayu
(VCD)
- VCD mengandungi pengenalan pertuturan
kiu dan 12 bab pembelajaran pertuturan
kiu yang mudah
- Menggunakan model manusia dan
rakaman berbentuk video
Persatuan
Kebangsaan
Pekak Malaysia
& UNICEF
CD-ROM
Panduan
Bahasa Isyarat
Malaysia (CD-
ROM panduan
BIM, 2001)
- Mengandungi lebih 350 perkataan
- Fingerspelling dan phrases
- Isyarat ditunjukkan menggunakan
rakaman video model manusia
- Ada latihan untuk mengukuhkan
pembelajaran
APIIT (Asia
Pacific Institute
of Information
Technology)
Malaysian
Sign Language
Guide (VCD
Panduan BIM,
2003)
- 60 minit CD
- Mengandungi 24 bab BIM
- Isyarat yang mudah dipelajarai dan
difahami
Malaysian
Federation of the
Deaf
(Persekutuan
Orang Pekak
Malayisa)
Kajian ini turut diakui oleh Efthimiou & Fotena (2007) bahawa material dan peralatan untuk
pendidikan komuniti pekak masih sangat kurang. Ini disebabkan sebahagiannya kerana salah
tanggapan bahawa orang pekak boleh melihat, mereka juga boleh mencapai materal bertulis.
Hakikatnya, individu yang dilahirkan pekak mendapati ia adalah sangat sukar untuk
menghubungkaitkan antara konsep dan bentuk tulisan.
Di dalam kajian ini kami mencadangkan rekabentuk perisian pendidikan menggunakan
teknologi animasi untuk membolehkan persembahan komprehensif (menyeluruh) pertuturan
kiu untuk menyokong antaramuka yang mempunyai kemudahcapaian kepada oku pekak /
masalah pendengaran. Kemudahcapaian atau accessibility oku pekak kepada perisian
pendidikan nampak mudah dan tidak menimbulkan masalah kerana mereka berupaya
menggunakan tetikus, papan kekunci dan membaca kecuali tidak boleh membaca. Hakikat
sebenarnya, kanak-kanak yang dilahirkan sebagai oku pekak sangat sukar untuk mendapat
maklumat kerana mereka tidak tahu membaca dan tidak boleh mendengar untuk mempelajari
kehidupan daripada sekeliling. Kajian dan pembangunan perisian pendidikan MudahKiu ini
menggabungkan kaedah komunikasi menggunakan pertuturan kiu, mengaplikasikan prinsip
kemudahcapaian (accessibility) dan teknologi multimedia.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 157
4. Cadangan untuk Rekabentuk Kemudahcapaian Perisian Pendidikan
Secara umumnya kemudahcapaian melibatkan komponen teknikal dan antaramuka. Menurut
Shawn (2007) pada asasnya kemudahcapaian bermaksud orang kurang upaya (oku) boleh
menggunakan produk tersebut. Secara lebih spesifik, kemudahcapaian menjadikan
antaramuka pengguna boleh dilihat (perceivable), boleh diguna (operable) dan difahami oleh
pengguna dari pelbagai lapisan keupayaan. Kemudahcapaian juga akan menjadikan sesuatu
produk lebih berguna kepada pengguna di dalam pelbagai lapisan situasi keadaan
(circumtances), persekitaran dan condition. Kemudahcapaian akan menjadikan sesuatu
produk lebih berguna kepada manusia di dalam pelbagai keadaan termasuk orang awam
(bukan OKU).
Menurut Burghstahler (2008), memasukkan ciri-ciri kemudahcapaian (accessibility features)
ketika satu-satu produk multimedia dibangunkan adalah lebih mudah berbanding
memberikan kemudahan itu semasa OKU meggunakan media tersebut dikemudian hari.
Membangunkan ciri-ciri kemudahcapaian untuk semua produk berarahan (instructional
product) adalah berkait rapat dengan prinsip-prinsip rekabentuk sejagat (universal design).
Rekabentuk sejagat (ud) boleh didefinisikan sebagai rekabentuk produk dan persekitarannya
boleh digunakan oleh semua orang (semua lapisan masyarakat) tanpa perlu pengubahsuaian
atau rekabentuk spesifik. (Center for Universal Design, 2002).
Untuk meningkatkan kemudahcapaian perisian pendidikan kepada pengguna yang
menghadapi masalah pendengaran, pembangun boleh (NCAM 2006) :
1. menyediakan semua maklumat audio dalam bentuk visual.
2. menyediakan sari kata (captions) di dalam semua persembahan multimedia.
3. memastikan semua visual cues disedari pengguna walaupun pengguna tidak melihat terus
pada skrin. Maklumat penting mesti mampu menarik perhatian pengguna.
Pembangunan yang berjaya perlu mengambilkira banyak perkara termasuk pakar, pengguna,
pedagogi, kandungan dan rekabentuk. Wald (1998) telah memberi garis panduan isu-isu
rekabentuk yang perlu diambilkira digunakan di dalam merekabentuk perisian pendidikan
untuk oku iaitu isu HCI, kawalan dan navigasi, rekabentuk skrin, elemen multimedia dan
rekabentuk dokumen HTML.
Dengan mengambilkira isu-isu rekabentuk tersebut dan faktor-faktor HCI kami integrasikan
ke dalam pembangunan perisian pendidikan yang dibangunkan dan membentuk model
Pembangunan perisian pendidikan untuk oku pekak seperti di dalam rajah 2. Model
pembangunan perisian ini dibina berasaskan model ID ADDIE dan prinsip-prinsip
rekabentuk sejagat (Universal Design). Model ini turut mengambilkira proses kejuruteraan
perisian umum serta aspek yang berkaitan dengan pendidikan seperti persekitaran pengajaran
dan pembelajaran, kurikulum, kaedah membaca, pendekatan errorless, model Scaffolding,
teori pembelajaran dan matlamat pembelajaran.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 158
Rajah 2 : Model pembangunan
Aspek kemudahcapaian perlu melalui proses ujian kepenggunaan bagi memastikan ia benar-
benar memenuhi keperluan pengguna. Pendekatan pemerhatian, participatory design dan
temubual metakognitif dilakukan terhadap pelajar yang dikaji dan tujuh pelajar yang lain.
Bilangan sampel kajian adalah menurut saranan Johnson & Schleyer (2003) dan Nelsen
(2005). Ujian kepenggunaan yang dijalankan bagi mendapatkan maklumat daripada sasaran
oku pekak berhubung dengan antaramuka, kaedah pembelajaran dan isi kandungan modul
yang diterapkan dalam perisian mudah kiu (perisian pertuturan kiu Bahasa Melayu) yang
dibangunkan.
5. Kesimpulan dan Kajian Lanjutan
Setiap hari, semakin banyak material pendidikan disampaikan di dalam bentuk elektronik.
Bagaimanapun, kebanyakannya direkabentuk untuk pengguna normal. Jika sesuatu bahan
pendidikan direkabentuk dengan mengambilkira isu-isu kemudahcapaian sejak dari awal
pembangunan, ia akan mengurangkan kos, menambah bilangan pengguna yang lebih luas,
selain mematuhi piawaian tertentu yang telah ditetapkan. Di dalam kajian ini, kami
menekankan kajian di dalam rekabentuk Perisian Pendidikan untuk Pertuturan Kiu Bahasa
Melayu bagi oku pekak. Pembangunan ini hanyalah prototaip untuk mengkaji keperluan
perisian pendidikan kepada oku pekak untuk subjek Bahasa Melayu. Ia boleh diluaskan
kepada pelbagai subjek lain seperti Bahasa Inggeris, Iqra, Sains atau Matematik dan subjek-
subjek kemahiran hidup (vokasional). Selain itu ia juga boleh diluaskan lagi bukan sahaja
untuk OKU pekak namun juga oku yang lain seperti buta, pekak dan buta, dan lain-lain.
Masih banyak perisian kursus yang perlu dibangunkan untuk kegunaan dan kemudahcapaian
oku. Langkah ini akan dapat menjadikan mereka golongan yang berilmu, lebih berdikari dan
mendapat peluang sama rata seperti ahli masyarakat lain seterusnya merapatkan jurang
anatara masyarakat normal dan oku.
Rujukan
Bond,G.L.,Wasson,B.B.,Tinker,M.A.,Wasson ,J.B (1994). Reading Difficulties:Their
Diagnosis and Correction. Needham Heights,MA: Allyn and Bacon
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 159
Burgstahler S.,Tracy Jirikowic, Beth Kolko, Matt Eliot (2004). Software accessibility,
usability testing and individuals with disabilities. ITD Journal. Retrieved March 30, 2009
from http://people.rit.edu/easi/itd/itdv10n2/burghsta.htm
Burgstahler,S. 2008. Designing software that accessible to individual with disabilities.
Retrieved March 24, 2009 from http://www.washington.edu/doit/Brochures/Technology/
design_software.html
Center for Universal Design North Carolina State University. (2002). What is universal
design? Retrieved March 18, 2009 from http://www.design.ncsu.edu/cud/univ_design/ud.htm
Cued Speech Association UK. (2009). Cued Speech Research. http://www.cuedspeech.co.uk
DO-IT : Disabilities, Opportunities, Internetworking and Technology (2004). DO-IT
Snapshots 2001. Seattle: University of Washington. Retrieved March 30, 2009 from
http://www.washington/edu/doit/Snapshots
Efthimiou, E., S-E. Fotinea (2007). An Environment for Deaf Accessibility in Education
Content. ILSP - Institute for Language and Speech Processing . Retrieved April 2, 2009
from http://www.ilsp.gr/docs/amea/ICTA07.pdf
Franklin H. (2006). Cued Speech and literacy. History, Research and background
Information. National Cued Speech Association. http://www.cuedspeech.org
Fung P.C, Bonnie Chow W.Y,McBride-Chang C.(2005). Impact of Dialogic Reading
Program on Deaf and Hardof Hearing Kindergarten and Early Primary School-Aged
Students in Hong Kong. Journal of Deaf Studies and Deaf Education; 1 0(1).
Gentry M.M, Chinn K. M.,Moulton R.D. (2005) Effectiveness of Multimedia Reading
Materials When Used with Children Who Are Deaf. American Annals of the Deaf, Vol.
149(5). ERIC Database.
Goldin-Meadow & Mayberry (2001) How Do Profoundly Deaf Children Learn to Read?
Learning Disabilities Research & Practice,16(4) 222-229.
Hasselbring, T. S., & Glaser, C. H. (2000). Use of computer technology to help students with
special needs. Future of Children, 10(2), 102-22.
Johnson, L.A. & Schleyer, T.K.L.(2003). Developing high-quality educational software.
Journal of Dental Education 11(67) : 1209-1220
Kim, D., & Gilman, D. A. (2008). Effects of Text, Audio, and Graphic Aids in Multimedia.
Instruction for Vocabulary Learning.Educational Technology & Society, 11 (3), 114-126.
Klironomos, I., Antona, M., Basdekis, I., Stephanidis, C. 2005. EDeAN secretariat for 2005
Whita Paper : Promoting Design For All and e-Accessibility in europe Universal Access in
the Information Society. Interntional Journal vol. 5(1)(June 2006).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 160
Korat,O. & Shamir A.,(2006) Electronic books versus adult readers: effects on childrens
emergent literacy as a function of social class. Journal of Computer Assisted Learning , 23,
248259.
Leanne R. K. & Gerald Tindal. (2007). Embedded Technology : Current and Future
Practices for Increasing Accessibility for All Students. Journal of special education
technology : 2007 ;22,4 ; ProQuest Education Journals
Lynch, L., Fawcett, A. J. & Nicholson, R. I.( 2000). Computer-Assisted reading intervention
in a secondary school: An Evaluation Study. British Journal of Educational Technology.
31(4): 333-348
Mayer, C. (2007) What Really Matters in the Early Literacy Development of Deaf
Children.Journal of Deaf Studies and Deaf Education.; 12:411-431.
National Center for Accessible Media (NCAM). 2006. Accessible Digital Media: Design
Guidelines for Electronic Publications, Multimedia and the Web. Retrieved October 24, 2009
from http://ncam.wgbh.org/publications/adm/disabilities.html
National Cued Speech Association. (2006). Research Findings Regarding Cued Speech.
http://www.cuedspeech.org.
Nielsen, J. (1996). Usability testing metrics. IEEE software. Vol 13(6), pg12-13.
Oyer, H. J., Hall, B. J. & Haas, W. H. 1994. Speech Language and Hearing Disorders :A
Guide for The Teacher. Boston : Allyn and Bacon.
Salawati Haris. (2009). Dilema 30,000 warga pekak. Milenia Muslim September:38-41.
Shawn Lawton Henry. (2007). Just Ask : Integrating Accessibility throughout Design.
Retrieved June 25, 2009 from www.uiAccess.com/accessucd/
Siew Hock Ow, Salimah Mokhtar & Roziati Zainuddin & Tolman, (2007). A Review on the
Teaching and Learning Resources for the Deaf Community in Malaysia. Chiang Mai
University Journal. Vol 1(1). (p 165-176)
Success stories (2002). San Rafael, CA: The Alliance for Technology Access. Retrieved
December 2, 2009, from www.ataccess.org/resources/fpic/successes.html
Tan Chin Guan. (1997). Speaking with deaf children. Kuala Lumpur. National Society for the
Deaf, Malaysia. Malaysian Council for Child Welfare. Library Association of Malaysia.
Wald M. (1998). Designing Accessible Courseware. Retrieved July 4, 2009 from
htt://soton.ac.uk/~shec/sheccoursewaredesign.htm
Xiaoming Li & Atkins, M.S.( 2004). Early Childhood computer experience & Cognitive and
Motor development. PEDIATRICS. 113 (6):1715-1722
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 161
REKA BENTUK DAN PEMBANGUNAN PENCERITAAN DIGITAL DAN
TEKNOLOGI REALITI TAMBAHAN (AUGMENTED REALITY) UNTUK
MEMBANTU PELAJAR PEMULIHAN MEMBACA BAHASA MELAYU
Abstrak:
Penceritaan digital merupakan salah satu teknologi yang boleh diimplementasikan dan
diadaptasi dalam kurikulum Bahasa Melayu. Teknologi realiti tambahan (AR) pula
digunakan sebagai nilai tambah untuk menerapkan elemen seronok (fun) dan seterusnya
menarik pelajar untuk lebih lama membaca (engagement). Objektif pertama kajian ini
bertujuan untuk menunjukkan kerangka konsepsi penceritaan digital dan teknologi AR.
Objektif ke dua pula untuk menerangkan proses pembangunan yang terlibat. Prototaip ini
dibangunkan berasaskan kaedah Rapid Prototyping dan menggunakan Flash dan
FLARToolkit sebagai platform utama. Kertas kerja ini dibahagikan kepada lima bahagian
iaitu: Pengenalan, Kajian literatur, Fasa Reka Bentuk, Fasa Pembangunan Prototaip dan
Kesimpulan. Hasil ini akan dibawa kepada penyelidikan seterusnya iaitu untuk menguji
keberkesanan prototaip, menguji kefahaman pelajar (kognitif) dan pemantauan tingkah laku
(behaviour) ketika berinteraksi dengan prototaip. Dengan terhasilnya prototaip ini diharap
dapat memberi gambaran kepada guru, penyelidik, penggubal kurikulum dan pihak berminat
untuk mengadaptasi dan mengembangkan kaedah ini dalam pengajaran, pembelajaran dan
penyelidikan.
Kata kunci: Penceritaan digital, augmented reality, membaca, pelajar pemulihan, bahasa
Melayu.
1. Pengenalan
Cerita merupakan satu elemen yang boleh menarik perhatian pelajar. Di samping itu cerita
juga digunakan untuk menggabungkan idea, menyentuh emosi, menggambarkan keadaan
hidup, menyatakan pandangan masyarakat (Weinberger, 1996), meningkatkan pembangunan
literasi (Wells, 1987) dan cara semula jadi perkembangan kemahiran literasi kanak-kanak
(Kozlovich, 2002). Norhayati et.al (2000) menyatakan melalui cerita, kanak-kanak boleh
memperoleh perbendaharaan kata yang baru, nilai moral, pengetahuan asas, menyelesaikan
masalah dan mengenali keindahan bahasa tersebut melalui penyampaian cerita.
Elemen digital menjadikan cerita lebih menarik baik bagi kanak-kanak mahupun orang
dewasa. Pergerakan imej 2D dan 3D, muzik, efek bunyi, suara, jalan cerita memberi nafas
baru kepada cerita yang disampaikan. Augmented reality (AR) pula merupakan salah satu
teknologi baru yang boleh digabungkan di dalam sesebuah penceritaan. AR merupakan suatu
keadaan di antara alam realiti dan alam maya (Hafiza & Halimah, 2009). Ia menambah baik
persekitaran nyata bukan menggantikan dengan persekitaran baru. Azuma et.al (2001)
mendefinisikan AR sebagai satu sistem yang mengkombinasikan objek maya dan objek nyata
di dalam alam nyata secara interaktif dan mendaftar ke dua-dua objek serentak. Objek AR
boleh mewujudkan objek maya di alam nyata. Keadaan ini diharap dapat membantu pelajar
Hafiza Abas
Kolej Sains dan Teknologi
Universiti Teknologi Malaysia (UTM)
Jalan Semarak, Kuala Lumpur
hafiza@citycampus.utm.my
Halimah Badioze Zaman
Fakulti Teknologi dan Sains Maklumat
Universiti Kebangsaan Malaysia
Bangi, Selangor
hbz@ftsm.ukm.my
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 162
pemulihan untuk memberi tumpuan dan fokus semasa sesi mendengar cerita dan membaca
diadakan.
Pelajar pemulihan merupakan pelajar yang mengalami masalah pembelajaran dalam
membaca, menulis dan mengira (3M). Mereka mempunyai keupayaan kognitif yang terhad
seperti susah untuk mengenal huruf, nombor dan memproses arahan dan maklumat yang
diterima. Sekolah di Malaysia menggunakan ujian diagnostik bagi mengesan pelajar yang
mengalami masalah pembelajaran. Pelajar yang dikesan akan diasingkan sesi pembelajaran
ke kelas pemulihan atau kelas pendidikan khas supaya guru dapat memberi tumpuan yang
lebih kepada mereka.
Kajian ini akan menunjukkan reka bentuk dan pembangunan untuk penceritaan digital
dengan menggabungkan teknologi realiti maya untuk pelajar pemulihan. Kertas kerja ini akan
meninjau kajian literatur, membincangkan fasa reka bentuk dan pembangunan dan
kesimpulan. Kajian lepas menyatakan teknologi AR berpotensi untuk digunakan dalam
bidang pendidikan. Walau bagaimanapun, untuk menentukan kesahihannya, kajian dan
analisis perlu dijalankan untuk melihat kelebihan dan kesan teknologi ini. Ringkasnya, kertas
kerja ini melaporkan proses reka bentuk dan pembangunan kepada pelajar pemulihan dan
menunjukkan potensi teknologi AR yang boleh dikembangkan penggunaannya di dalam
bidang pendidikan di Malaysia.
2. Kajian Literatur
Kajian literatur akan membincangkan lima perkara utama dalam kajian ini iaitu penceritaan
digital, AR, Bahasa Melayu, pelajar pemulihan dan rapid prototyping. Penceritaan
merupakan salah satu modul dalam kajian yang sedang dijalankan. Modul-modul lain ialah
modul membaca bersama, modul permainan dan modul latihan. Semua modul akan menyelit
teknologi AR. Modul penceritaan akan didedahkan dahulu kepada pelajar untuk memerhati
bagaimana pelajar dapat memahami cerita, menceritakan semula dan berinteraksi dengan
objek AR.
2.1 Penceritaan Digital
Penceritaan digital merupakan penyampaian cerita menerusi peralatan komputer dan
teknologi multimedia. Cerita merupakan elemen utama dalam pemikiran dan komunikasi
manusia (Schank, 1995). Penyampaian cerita merupakan cara terawal digunakan untuk
mengajar dan juga bentuk literatur yang tertua (Pedersen, 1995). Tsou et al., (2006) dalam
penyelidikannya menyatakan pergabungan antara penceritaan digital dan kurikulum
merupakan satu teknik belajar yang kreatif yang mana dapat meningkatkan aras membaca,
menulis, bertutur dan mendengar pelajar. Walau bagaimana pun, tiada kajian lepas yang
dibuat untuk menganalisis kesan penceritaan digital dan AR kepada pelajar pemulihan dalam
belajar bahasa Melayu.
2.2 Augmented Reality
AR merupakan variasi kepada persekitaran maya. AR melibatkan interaksi, kandungan maya,
persekitaran sebenar, penceritaan digital dan imaginasi. Ini memberi pengalaman belajar yang
baru kepada pelajar pemulihan. AR bukan merupakan aplikasi tunggal, ia menggunakan
komputer, kamera web atau paparan head-mounted untuk menyokong fungsinya.
Penyelidikan mengenai AR dan pendidikan banyak dijalankan di negara-negara barat. Jadual
1 menunjukkan beberapa kajian lepas yang menggunakan teknologi AR dalam pendidikan.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 163
Penyelidikan dan penyelidik Penerangan Ringkas
Augmented Reality and Rigid Body
Simulation For Edutainment
(Buchanan,P., Seichter, H., Billinghurst,
M., Grasset, R., 2008)
Membangunkan toolkit untuk
menghubungkan dunia nyata dan maya (AR)
menggunakan simulasi badan. Kajian ini
membangunkan permainan untuk
menerangkan chain reaction dan physical
contraptions berasaskan belajar sambil
bermain
Edutainment with a Mixed Reality
Book: A visually augmented illustrative
childrens book (Raphal Grasset et. al,
2008)
Buku yang telah diterbitkan digunakan untuk
menambahkan kesan teknologi realiti
campuran.
Supporting Low Ability Readers with
Interactive Augmented Reality (Dunser,
2008).
Mengkaji bagaimana kesan AR interaktif
terhadap kanak-kanak yang kurang
kepandaian.
Augmented Biochemistry
(Medina et al., 2008).
AR diimplementasikan dalam bidang bio
kimia untuk membantu pelajar memahami
mata pelajaran tersebut.
The Design of a Mixed-Reality Book: Is
It Still a Real Book?
(Raphael Grasset et.al, 2008)
Kajian tentang buku realiti campuran, ruang
reka bentuk dan pengalaman pengguna
dengan antara muka tersebut.
Virtual Pop-Up Book Based on
Augmented Reality ( Nobuko et al,
2007).
Memaparkan objek maya 3D pada buku
sebenar tanpa penggunaan penanda
(markers).
AR-Jam Early literacy (Dunser &
Hornecker, 2007).
Menggunakan teknologi AR untuk
membangunkan cerita interaktif kepada
kanak-kanak 5 hingga 7 tahun.
An observational study of children
interacting with an augmented story
book
(Andreas Dnser & Eva Hornecker,
2007).
Pemerhatian digunakan untuk memerhatikan
bagaimana kanak-kanak menggunakan buku
cerita AR.
Science and Augmented Reality
(Kerawalla et al, 2006).
AR untuk mempelajari buni, matahari dan
bulan untuk pelajar sekolah rendah.
The Haunted Book
(Camille Scherrer et. al 2008)
Menggunakan teknologi AR dalam
mengilustrasikan buku puisi.
Learning Using Augmented Reality
Technology: Multiple Means of
Interaction for Teaching Children the
Theory of Colours (Ucelli et al. 2005).
AR menyediakan antara muka nyata dan
objek fizikal digunakan untuk komunikasi
bermakna.
An interactive 3D exploration narrative
interface for storytelling
(Zhi Ying Zhou et.al, 2004)
Menggunakan media campuran dengan antara
muka berbentuk kiub untuk penceritaan.
AR Volcano (Woods et al., 2004). Pengguna belajar mengenai gunung berapi
dan boleh berinteraksi dengannya.
Vivid Encyclopaedia (Shibata et al,
2004)
Merupakan buku mengenai serangga dengan
menggunakan teknologi AR.
Eye Magic Book (McKenzie & Dernell,
2004).
Meneroka bagaimana kanak-kanak belajar
membaca dengan cara yang baru dengan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 164
menggunakan teknologi AR. Pengguna
melihat animasi 3D dan bunyi.
Little red:storytelling in mixed reality
(Saso et al, 2003).
Taman permainan yang dibangunkan dalam
realiti campuran.
Augmented Chemistry
(Morten & Benedikt, 2002).
Melaporkan beberapa kebaikan bagaimana
belajar kimia dengan teknologi AR.
BlackMagicBook
Eric et.al. (2001).
MagicBook meneroka bagaimana antara
muka boleh dibangunkan bagi membenarkan
hubungan antara realiti fizikal, AR dan realiti
maya dalam bentuk usaha sama
(collaborative).
Jadual 1. Penyelidikan lepas yang berkaitan dengan pengajaran dan pembelajaran
menggunakan teknologi AR.
AR mampu memberi motivasi kepada pelajar dengan fungsi intuitif dan interaksi yang ramah
pengguna, yang mana akan memberi kesan pemahaman dalam proses pengajaran dan
pembelajaran (Chen, 2006). Pengguna akan melihat dan berinteraksi dengan kandungan maya
dalam situasi sebenar dengan adanya teknologi AR (Dunser, 2008). Pengalaman fizikal,
kandungan maya, penceritaan dan imaginasi pengguna merupakan pengalaman pembelajaran
berbentuk hiburan yang ideal yang terdapat pada realiti campuran dan permainan (Stapleton
et. al., 2002). Motivasi dan tumpuan merupakan kebaikan belajar dengan penggunaan
teknologi (Dunser, 2008) selain daripada membina kefahaman daripada proses 3D yang
dinamik (Winn et al., 2002), dan mampu memahami kandungan yang kompleks atau sukar
(Dunser et al., 2006).
Di Malaysia pula, penyelidikan dan pembangunan perisian mengenai penggunaan teknologi
dalam pendidikan sedang giat dijalankan. Ia pula tidak terhad kepada mata pelajaran sains
dan matematik, tetapi juga bahasa Melayu. Misalnya KPM telah membangunkan beberapa
siri pembelajaran berbentuk animasi 2D seperti KACEMM (Kaedah Cepat Membaca dan
Menulis), Mutiara (untuk belajar membaca), Menguasai Abjad (untuk murid prasekolah) dan
BACEPAT (Baca Cepat). Namun produk-produk ini tidak memasukkan elemen mendengar
cerita sebagai salah satu modul di dalam produk mereka. Produk tersebut terus mengajar
membaca abjad, suku kata, perkataan dan seterusnya ayat. Keupayaan mendengar dan
memahami merupakan elemen penting sebelum mengajar kanak-kanak membaca. Antara
penyelidikan mengenai membaca bahasa Melayu yang dijalankan ialah Pembinaan Senarai
Kata Awal Membaca: Integrasi pendekatan dan hafal kata (Nadiyah & Marini, 2008),
Masalah Penguasaan Kemahiran Membaca di Peringkat Awal Kanak-kanak (Tajul Aripin,
2008), Cerita Taulan (Munir, 2001), CD-Pembangunan Perisian Kursus Multimedia Untuk
Belajar Membaca: Satu Pendekata (Hibrid (HALR) (Norkhairani, 2004) dan Awal Membaca
Bahasa Melayu: Keberkesanan Kaedah Gabungan Bunyi Kata untuk Prasekolah dan
Pemulihan (Isahak, 2007). Semua penyelidikan ini memberi tumpuan kepada multimedia dan
animasi 2D. Pendedahan mengenai AR dan teknologi 3D masih belum diperkenalkan lagi.
2.3 Bahasa Melayu
Bahasa Melayu merupakan bahasa rasmi dan bahasa kebangsaan negara Malaysia. Semua
pelajar wajib lulus mata pelajaran tersebut untuk memudahkan mereka meneruskan pengajian
ke peringkat yang lebih tinggi. Bagi pelajar pemulihan, mereka tidak mampu untuk membaca
dan menguasai bahasa Melayu dengan baik. Tetapi mereka perlu menduduki dan menjawab
kertas peperiksaan yang sama dengan pelajar normal. Bagi membantu pelajar pemulihan
membaca beberapa analisis mengenai bahasa Melayu telah dibuat. Bahasa Melayu terdiri
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 165
daripada 7 kata tunggal dengan satu suku kata, 11 kata tunggal dengan dua suku kata, 19
kata tunggal dengan 3 suku kata dan 12 kata tunggal dengan empat dan lebih suku kata (Nik
Safiah et.al., 2006). Jadual 2 menunjukkan contoh kata tunggal dengan dua suku kata.
Satu perkataan dengan dua
suku kata
Contoh
V+KV Itu, ini, ibu, ubi, api, apa
KV+KV Buku, buka, bola, baju, pasu, kaki, batu,
KV+KVK Tikar, telur, sikat, kapal, mulut, bakul
KVK+KV Senja, pandu, lampu, bendi, sendi, benda
*K=konsonan *V=vokal
Jadual 2: Kata tunggal dengan dua suku kata.
Analisis ini sebagai garis panduan untuk membangunkan prototaip mengikut tahap kesukaran
perkataan. Pelajar pemulihan mengalami masalah untuk membaca dan masalah memahami
apa yang dibaca. Dalam penyelidikan ini hanya ayat-ayat yang pendek dan tepat digunakan
untuk menyampaikan cerita.
2.4 Pelajar Pemulihan
Pelajar pemulihan dipilih sebagai sasaran pengguna dalam penyelidikan ini kerana, pada
masa ini tiada perisian khas yang dikhususkan untuk mereka belajar membaca bahasa
Melayu. Tambahan lagu teknologi AR masih baru di Malaysia, belum dibangunkan dan
diimplementasikan dalam pengajaran dan pembelajaran di peringkat rendah, peringkat
menengah mahupun universiti.
Pemerhatian telah dibuat (selama 6 bulan) ke atas ciri pelajar pemulihan, tingkah laku, aras
bacaan, menulis, mengeja dan mendengar semasa sesi pembelajaran Bahasa Melayu. Mereka
didapati sensitif, kurang aktif, hiperaktif, suka berkhayal, daya fokus hanya 1-3 minit, mudah
bosan, tidak berminat untuk belajar membaca, suka berborak dan suka meniru latihan yang
diberi. Ketika sesi membaca, mereka suka menghafal huruf dan 90% daripada mereka berada
di dalam fasa kata tunggal dengan dua suku kata (KV+KV). Hanya ada dua pelajar yang
mengalami masalah pertuturan iaitu menukar huruf G kepada D (sebutan cikgu menjadi
cikdu) dan menukar huruf K kepada T (kahwin kepada tawin). Dari segi ejaan pula, paling
banyak kesalahan ejaan, 90% daripada latihan ejaan yang diberi. Manakala masalah
pendengaran pula, pertama guru tidak boleh bercakap terlalu laju, memberi banyak arahan
pada satu masa dan memberi arahan yang mengelirukan.
Daripada pemerhatian yang dibuat, pelajar pemulihan bukan sahaja mengalami masalah
untuk membaca tetapi juga berkaitan dengan komponen bahasa yang lain seperti mendengar,
mengeja, menulis dan bertutur. Maklumat ini akan diguna pakai dalam pembangunan
prototaip untuk memenuhi kesesuaian dengan pengguna iaitu pelajar pemulihan.
2.5 Rapid Prototyping
Rapid prototyping ialah kaedah ataupun cara sesebuah perisian dibangunkan. Empat ciri
prototyping yang melibatkan proses iteratif berasaskan pengguna dan pembangun akan
diguna pakai dalam penyelidikan ini ialah mengenal pasti kehendak asas pengguna,
membangunkan prototaip, implementasi prototaip dan menambah baik prototaip (Nauman
&Jenkins, 1982). Kebaikan utama kaedah ini ialah maklum balas daripada pengguna tentang
prototaip yang sedang dibangunkan.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 166
2.6 Kesimpulan
Teknologi AR berpotensi untuk membantu pelajar pemulihan belajar bahasa Melayu. Namun
sejauh mana keberkesanannya masih menjadi satu persoalan. Penyelidikan ini akan
memperlihatkan keberkesanan dan masalah yang akan timbul apabila menggunakannya
kelak.
3. Reka Bentuk
Penghasilan reka bentuk adalah berdasarkan dapatan daripada peringkat analisis. Reka bentuk
kandungan, reka bentuk perisian dan reka bentuk model scaffolding merupakan sub fasa
dalam fasa ini. Model konsepsi yang telah dibangunkan. Jadual 3 menunjukkan model
konsepsi bagi Modul Penceritaan. Manakala rajah 1 pula menunjukkan arah aliran pandu arah
dan sub-modul dalam modul penceritaan berserta komponen-komponennya.
Jadual 3: Model Konsepsi bagi Modul Penceritaan
Fasa 1: Mengenal Pasti Masalah dan Keperluan Kajian
Analisis Keperluan:
- Kajian literatur tentang keperluan penceritaan dalam mempelajari bahasa
dan membaca, kepentingan dan kebaikan penceritaan.
- Temu bual guru dan pelajar tentang penceritaan.
- Pemerhatian.
Fasa 2: Reka Bentuk dan Pembangunan
- Reka bentuk kandungan: Objektif, kandungan dan hasil pembelajaran,
skrip, papan cerita, model konsepsi.
- Reka bentuk Perisian: antara muka pengguna, arah aliran navigasi, reka
bentuk interaksi, carta alir, seni bina modul.
- Reka bentuk model scaffolding.
- Pembangunan: Pembangunan modul penceritaan:
o Mari Dengar Cerita: Cerita animasi multimedia dalam animasi 2D.
o Nyanyian: Objek Augmented Reality (AR) dan lagu kanak-kanak.
o Senarai semak: Literasi (Kefahaman, bercerita semula, kemahiran
mendengar) dan Sikap
Fasa 3: Pengujian, Implementasi dan Penilaian.
- Pengujian: Pengujian prototaip.
- Implementasi: Pelajar menggunakan prototaip.
- Penilaian:
o Penilaian terhadap prototaip (Antara muka, Kandungan)
o Penilaian terhadap pelajar (Kepenggunaan: Kepuasan, Keberkesanan
dan Kecekapan)
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 167
Rajah 1: Aliran Pandu Arah (navigation) dan Sub Modul bagi Modul Penceritaan
Pembangunan holistik kepada pelajar pemulihan iaitu kognitif, afektif dan psikomotor
diterapkan dalam modul ini. Manakala teori pembelajaran yang diterap ialah teori kognitif,
tingkah laku dan motivasi. Rajah 2 pula menunjukkan komponen pembelajaran, aktiviti,
penilaian dan sokongan yang dimuatkan dalam modul ini.
Rajah 2: Komponen Pembelajaran, Aktiviti, Penilaian dan Sokongan dalam Modul
Penceritaan
4. Pembangunan Prototaip
Fasa pembangunan bagi modul penceritaan melibatkan tiga proses iaitu:
i. Pembangunan cerita dalam animasi 2D.
ii. Pembangunan aktor bagi AR.
iii. Penghasilan senarai semak bagi penilaian literasi dan kepenggunaan.
Dalam proses pembangunan penggunaan carta alir dan papan cerita daripada fasa reka bentuk
digunakan. Ini ialah supaya proses pembangunan selari dan sistematik dengan proses analisis
dan reka bentuk. Pembangunan cerita animasi 2D dibangunkan dengan perisian Macromedia
Flash MX. Manakala proses reka bentuk aktor bagi AR dibangunkan dengan perisian 3D
Studio Max. FlarToolkit merupakan perpustakaan kod sumber terbuka (open source code
library) untuk AR dalam Flash. Penanda atau marker diperlukan untuk kamera web
mengesan objek AR. Penanda boleh dibangunkan dengan Adobe Photoshop. Apabila objek
dikesan, AR toolkit akan memaparkan objek 3D.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 168
Rajah 3: Penanda dan objek AR bagi aktor Cili Hijau dan Pen
5. Kesimpulan
Proses bercerita telah berubah mengikut peredaran zaman. Penceritaan digital dan AR boleh
digabungkan untuk menghasilkan pengalaman mengajar dan belajar yang lebih bermakna. Ia
juga berpotensi proses pembelajaran membaca di samping mampu mengetengahkan elemen
humor dan memberi keinginan untuk pelajar ingin terus belajar. Penyelidikan ini diharap
dapat memudahkan dan meningkatkan minat pelajar pemulihan untuk berjuang mengatasi
masalah kesukaran membaca yang dihadapi oleh mereka.
Fasa seterusnya dalam penyelidikan ini ialah fasa implementasi. Prototaip akan digunakan
oleh pelajar pemulihan. Pemerhatian dan beberapa penilaian akan dibuat untuk melihat sejauh
mana keberkesanan teknologi AR dan penceritaan kepada pelajar pemulihan untuk belajar
bahasa Melayu. Hasil laporan ini akan diambil untuk mereka bentuk dan membangunkan
semula modul ini sesuai dengan kehendak dan keperluan pengguna.
Rujukan
1. Andreas Dnser, E. H. (2007). An observational study of children interacting with an
augmented story book [Electronic Version], from
www.ehornecker.de/Papers/edutainment_2007_duenser.pdf
2. Andreas Dnser. (2008). Supporting Low Ability Readers with Interactive
Augmented Reality. [Electronic Version]. Retrieved 8 Jan 2009, from
http://www.hitlabnz.org/publications/2008.SupportingLowAbilityReadersWithInterac
tiveAugmentedReality.pdf.
3. Andreas Dunser, E. H. (2007). An Observational of Children Interacting with an
Augmented Story Book. Springer-Verlag, 305-315.
4. Andreas Dunser, H. K., Karin Steinbugl, Hudith Gluck,. (2006). Virtual and
Augmented Reality as Spatial Ability Training Tools. Paper presented at the CHINZ
2006.
5. Andreas Dunser. (2007). AR Jam [Electronic Version]. Retrieved 7 Januari 2010,
from www.hitlabnz.org/wiki/AR_Jam
6. Camille Scherrer , J. P., Pascal Fua , Vincent Lepetit,. (2008 September 15-18). The
haunted book. Paper presented at the 7th IEEE/ACM International Symposium on
Mixed and Augmented Reality,.
Cili Hijau
dalam
bentuk 3D
Penanda
atau marker
yang akan
di kesan
oleh kamera
web
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 169
7. Chen C J. (2006). The design, development and evaluation of a virtual reality based
learning environment. Australian Journal of Educational Technology, 22(1), 39-
63.Kk
8. Christopher Stapleton , C. H., Michael Moshell , Paulius Micikevicius , Marty
Altman, . (December 2002 ). Applying Mixed Reality to Entertainment, Computer.
ACM, 35(12), 122-124.
9. E. Martin Pedersen. (1995). Storytelling and the art of teaching. [Electronic Version].
FORUM, 33. Retrieved 15 Julai 2008, from
http://eca.state.gov/forum/vols/vol33/no1/P2.htm
10. Eliana Medina, Y.-C. C., Suzanne Weghorst. (2008). Understanding Biochemistry
with Augmented Reality [Electronic Version], 5. Retrieved 15 Jan 2009, from
http://students.washington.edu/emedina/wordpress/wp-
content/uploads/2008/10/edmedia07.pdf.
11. Gere, J., Kozolvich, B., & Kelin II, D. (2002). By word of mouth: A storytelling guide
for the classroom. Honolulu, HI: Pacific Resources for Education and Learning.
12. Hafiza Abas, H. B. Z. (2009). Augmented Reality: A Technology in Helping Reading
Disabilities Student Paper presented at the 1st International Conference on
Educational Research and Practice (ICERP) 2009.
13. Isahak Haron. (2007). Awal Membaca Bahasa Melayu: Keberkesanan Kaedah
Gabungan Bunyi-Kata untuk Prasekolah dan untuk Pemulihan (1 ed.). Tanjong
Malim: UPSI.
14. Issa Saso, T., Iguchi, K., Inakage, M.: Little Red: Storytelling in Mixed Reality,
SIGGRAPH 2003
15. Lucinda Kerawalla, R., Luckin Simon, Seljeflot Adrian, Woolard. (2006). Making it
real: Exploring the potential of augmented reality for teaching primary school science.
Virtual Real, 10(3), 163-174.
16. McKenzie J, D. D. (2004). The eyeMagic Book. A report into Augmented Reality
Storytelling in the Context of a children's workshop 2003. Chirstchurch: New Zealand
Centre for Children's Literature and Chrischurch College of Londono. Document
Number)Vv
17. Morten, F., & Benedikt, M. V. (2002). Augmented Chemistry: An Interactive
Educational Workbench. Paper presented at the Proceedings of the 1st International
Symposium on Mixed and AR.
18. Munir. (2001). Pembangunan dan Keberkesanan Pakej Multimedia Dalam
Pendidikan untuk Memotivasikan Literasi (MEL) di kalangan Kanak-kanak
Prasekolah. Universiti Kebangsaan Malaysia, Bangi.
19. Nadiyah Elias, M. A. G. (2008). Pembinaan Senarai Kata Awal Membaca: Integrasi
pendekatan fonetik dan Hafalkata. Paper presented at the Universiti Utara
Malaysia.Mm
20. Nauman, J.D & Jenkins, M. (1982). Prototyping: The new paradigm for systems
development. MIS Quarterly, 6(3), 29-44.
21. Nik Safiah Karim, F. M. O., Hashim Musa, Abdul Hamid Mahmood, (Ed.) (2006).
Kuala Lumpur: Dewan Bahasa Pustaka.
22. Nobuko Taketa, K. H., Hirokazu Kato, Shogo Noshida,. (2007). Virtual Pop-Up Book
Based on Augmented Reality. Paper presented at the HCII 2007, Berlin Heidelberg.
23. Norhayati Abd. Mukhti, H. B. Z., Tengku Mohd Tengku Sembok, Siew Pei Hwa,
Zurina Muda,. (2000). A Pedagogical Approach to Multimedia Courseware
Development to Motivate Reading Habit. IEEE
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 170
24. Norkhairani Abdul Rawi, & (2004 ). Pembangunan perisian kursus multimedia untuk
belajar membaca : satu pendekatan hibrid (HALR). Universiti Kebangsaan Malaysia,
Bangi.,,
25. Philip, B., Hartmut, S., Mark, B., Rapha, & l, G. (2008). Augmented reality and rigid
body simulation for edutainment: the interesting mechanism - an AR puzzle to teach
Newton physics. Paper presented at the Proceedings of the 2008 International
Conference on Advances in Computer Entertainment Technology.
26. Raphaael Grasset, A. D., Mark Billinghurst. (2008). Edutainment with a mixed reality
book: a visually augmented illustrative childrens' book. Paper presented at the
Proceedings of the 2008 International Conference in Advances on Computer
Entertainment Technology.
27. Raphael Grasset, A. D., Mark Billinghurst. (2008). The Design of a Mixed-Reality
Book: Is It Still a Real Book? IEEE International Symposium on Mixed and
Augmented Reality 2008.
28. Ronald Azuma, Y. B., Reinhold Behringer, Steven Feiner, Simon Julier, Blair
MacIntyre,. (2001). Recent Advances in Augmented Reality. IEEE Comput. Graph.
Appl., 21(6), 34-47.
29. Schank, R. (1990). Tell me a story: A new look at real and artificial memory. New
York: Charles Scribner's Sons.
30. Shibata, F., Yoshida, Y., Furuno, K., Sakai, T., Kiguchi, K., Kimura, A., Tamura, H.:
Vivid Encyclopedia: MR Pictorial Book of Insects. In: The VR Society of Japan
Annual Conference the 9th (in Japanese) pp. 611612 (2004)
31. Tsou, W., Wang, W., & Tzeng, Y. (2006). Applying a multimedia storytelling website
in foreign language learning. Computers & Education, 47, 1728.
32. Ucelli. G, C. G., Amicis R D, Servidio R. (2005). Learning Using Augmented Reality
Technology: Multiple Means of Interaction for Teaching Children the Theory of
Colours in M. Maybury. INTETAIN 2005, 3814, 193-202.
33. Weinberger, J. (1996). Literacy Goes to School: The Parents Role in Young
Children's Literacy Learning. London: Paul Chapman Publishing Ltd.
34. Wells, G. (1987). The Meaning Makers: Children Learning Language and Using
Language to Learn. London: Hodder & Stoughton.
35. Winn W, W. M., Fruland R, Lee Y. (2002). When does immersion in a virtual
environment help students construct understanding? Paper presented at the
Proceedings of International Conference of the Learning Societies.Mm
36. Woods. E, M. B., Looser J, Aldridge G, Brown D, Garrie B. (2004). Augmenting the
Science Centre and Museum Experience. Paper presented at the Proceedings of 2nd
International Conference on Computer Graphics and Interactive Techniques in
Australia and SouthEast Asia, Singapore.
37. ZhiYing, Z., Adrian David, C., JiunHorng, P., & Yu, L. (2004). An interactive 3D
exploration narrative interface for storytelling. Paper presented at the Proceedings of
the 2004 conference on Interaction design and children: building a community.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 171
TRAINING NEEDS FOR TEACHERS IN THE FIELD OF EDUCATION
Faida Imhemed Elwaerfly, Eman Ahmed Shihob & Nik Mohd. Rahimi Nik Yusofe
Department of Educational Methodology And Practice
Faculty of Education
University Kebangsaan Malaysia
faedh@yahoo.com
Abstract
The Significant Technological Progress In All Areas Of Our Age, which included the
field of education, both in educational materials or disciplines them, and ways and methods
of teaching and overall objective of the educational process, have gone through the
educational methods and different labels to become aware of "ended its importance and its
subsidiaries and objectives of the TMS technology education, where they adopted the labels
of teaching aids in the early stages on the senses , such as education , audio visual aids and
audio-visual, and then called to get an education and become known as audio-visual, media
and then the introduction of technology education, information and care , and that the
educational process as a whole since the beginning of development objectives of the
Educational Reform, and to take and even benefit from the proposals and also find that led
the revolution in communications and information technology and systems on the sweep
Very important changes in the world. Training is an urgent need for the functions of all of
this continuous growth in the human elements so you can keep up with rapid changes and
evolving area of work as is the case in the teaching profession and the basic education sector
condition, and because the scope for specialization and materials preparation of the
profession continue to evolve through scientific facts are new Learn the basics of approaches
and ideas, trends in education, psychological, and then meet those trends of education and
meet the challenges of new technology and will depend directly on improving the training
programs. Teacher training is just a prelude to a whole series of events and activities,
professional growth, which should continue with the teacher as long as life and as long as
there is science and knowledge, ideas and new technologies, and therefore the concept of
service and associated training of teachers to the concept of continuous growth, continuing
education, this requires the preparation of the teacher is seen as a continuous process, growth
has stopped and vocational and continuing training to be "necessary" to renew the experience
of teachers and increase their effectiveness, because the curriculum development and renewal
of teachers required advanced and renewable.
1 Introduction
The global changes of globalization and economic openness and the challenges imposed on
the ground and the states launched toward change and improvement in their educational
systems to increase their effectiveness and quality.
Witnessed a considerable development of effective schools and came to be seen as the basic
unit of planning and change, and it is able to control as well as and change control processes,
and teachers a basic and integral to the operations of school improvement, based on these
changes has become a function of the modern educational system: the preparation of
individuals has been the research tools for knowledge, derived from sources and how to deal
with the information content and how to understand and critique through the skills they
possess self-learning and continuous learning, cooperative learning, scientific thinking,
creativity and innovation, it has become the teacher in front of the functions and
responsibilities require new skills, knowledge and experience is unable to provide a training
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 172
system teacher in its traditional form, which showed the new forms of training based mainly
on the school (Najjar, 2007 & Mansour, 2003).
It is the teacher preparation and training method "to establish supervisory efficiencies teacher
education and development of performance and development of schools and development in
general (Abdeen, 2008).
Abu-Russ (2001) reported that teacher training is just a prelude to a whole series of events
and activities, professional growth, which must continue with the teacher as long as life and
as long as there are science and knowledge, new ideas and technologies and therefore the
concept of in-service training of teacher is linked to the concept of continuous growth and
continuing education. This requires that teacher preparation is seen as a continuous process
stopped and became professional growth and continuous training to be "necessary" to renew
the experiences of teachers and increasing their effectiveness, because the curriculum
developed and renewed teacher required advanced and renewable.
Teacher as a part of the education system needs to be ongoing support, and development of
permanent, to perform the tasks assigned to him and authors of educational policies and in
accordance with the philosophy of the State and society. In order to keep up pace of life in a
consistent manner and adapted to technological changes and advances in knowledge. The
teacher is also an important element in the educational system where he developed nations
have been turning its development. The renaissance of united and people through the
development and reform movements in the various areas of educational, social, political
should start from the teacher that the basis for the architecture, and to give priority attention
to it and upgrading the scientific and social as the essential foundation on which the repair of
any educational system, so it must be raising the issue of teacher objectively in order to know
the positions of the imbalances and problems affecting them, and stand on the needs and
desires, and met in order to reach results that will contribute to the development and improve
teacher performance (Samour, 2006).
Training is an urgent need in all the jobs that the growth of the ongoing in the human
elements so that they can keep pace with the rapid changes and evolving in the field of work
as it is in the teaching profession and the education sector is a fundamental requirement,
because the area of specialization and profesional preparation materials are constantly
evolving through new scientific facts that show the basics of learning approaches, ideas or
trends in education, psychological, and then meet those educational trends and meet the
challenges of new technology and will depend directly on the improvement of training
programs (Abu Russ, 2001).
Also should be in the light of identifying the training needs of trainees, good training is must
be based on identifying training needs of targeted individuals training to identify existing and
anticipated their needs in training. The challenge of identifying the training needs is the
cornerstone in the success of training process and represents the essential starting in the series
which are interrelated in a whole training program.
Based on the foregoing is the process of identifying training needs is the first step the
preparation of plans and training programs for teachers and school design, which will be
difficult to achieve the objectives of training plans efficiently by the identification of training
requirements, and it is also the process of identifying training needs to be essential to any
successful training process and a pillar of the foundations, so if its to accurately identify the
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 173
needs assessment and then compared and measured scientifically accurate, which is also the
best way to determine the amount to be provided with the teachers (as the quantity and
quality) of information, skills, attitudes and experiences designed to bring about development
and raise the professional competence (Abu Russ, 2001 & Ali 2007).
Some educators have pointed out that determining the needs of teachers as an essential step
for training programs is the application of the principle of psychology is that human behavior
is designed to satisfy the desires of certain identified by defining the needs (Abu Russ, 2001).
It is also determine the training needs of the most important things that pay the training
activity to achieve its goal, whenever possible, identify them and identified where possible to
meet and raise the efficiency of workers through training, measured by the success of any
design qualification training program for teachers and managers how to identify training
needs and accounted for and collected (Sharif & Sultan, 1983).
2 The Training Need
Information, skills and attitudes and knowledge of a particular development to be
amended or changed as response to changes or regulatory developments, technological or
human or as a result of functional change to meet the developments or expansions or a desire
to solve the problems of existing or expected. (Khatib, 2006) .
As defined by Hamad (2006) training needs "is a set of changes and developments to be
created in the teacher information and behavior, and trends with a view to raising the level as
it overcomes the problems that are impeding the process and productivity had". (Abdeen,
2008)
2.1 The importance of identifying training needs:
The identification of training needs is the cornerstone in the planning of training programs for
professional development for teachers, although knowledge of training needs and identified
according to scientific bases of training programs will help planners to design successful
training programs, considering that the knowledge and training needs identified along these
lines pave the way for more precise formulation of targets and the nearest realistic.
2.1.1 The importance of the process of identifying training needs of several considerations
are:
1. Training needs are the basis for all elements of the training process.
2. Identifying training needs help to improved performance is the main objective of training
in organizations.
3. The identification of training needs of the shows are the individuals to be trained and the
type of training and expected results.
4. The identification of training needs of working real teachers to raising the efficiency in
performing the work assigned to them.
5. The failure to identify training needs in advance, "lead to loss of time, money and time
spent on experimentation.
6. Identifying the training requirements of the basis for any training program, knowledge of
training requirements prior to any training activity, are comes before the program design and
implementation.
7. Done through training needs analysis of the work of teachers and find out their duties
responsibilities priorities, and skills necessary for them .( Sharif & Sultan , 1983. Al Harbi,
2004. Abdeen ,2008 ) .
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 174
3 Educational methods and techniques:
Learning tool known as each tool used by teachers to improve teaching and learning process
and to clarify the ideas, skills training and development of desirable values and attitudes,
without the teacher relies primarily on words, symbols and numbers (Alakalpy, 2003).
It is a tool of teaching aids in the heart of the educational process which is an essential tool to
help conduct education and increasing suspense and motivation of pupils, although many of
the educators be experiencing an ongoing think it's possible to do without teaching aids so
that most of them believe that the successful teacher is the only one who has the capacity to
teach His disciples, educational material and sometimes referred to a teacher who supports
the teaching of experimental methods in the selection of teaching aids, stated that time is
wasted in worthless to him and he could not quit the program because of the annual use of
such means.
As the world faces in general and Arabic countries in particular the challenges of increasing
and accelerated as a result of rapid developments in various fields, particularly scientific and
technological world has witnessed during the last quarter century, which is expected to
continue a significant acceleration, and the reason for this scientific and technical progress,
which was dominated at all walks of life that accompanied the development of education and
the renewal of teaching methods and the machine and the means to enter the field of
education, becoming a cornerstone "essential" in the educational process and not some sort of
luxury and therefore should not be a choice of means and Technical Education in vain "but
must be driven" from the importance of using. If the purpose of learning is the knowledge of
the oral refer to audio-visual media is a waste of time and money, and therefore the choice of
educational methods and use them appropriately required the teacher to be familiar with the
following aspects:
1. Learning tool that is part of the classroom building and related components and parts of
the rest of the classroom and share with them in achieving the objectives of the position
cannot achieve the goals optimally by using only the means of education.
2. Characteristics appropriate means to age in terms of mental abilities, skills and past
experiences.
3. To be an exciting way to rouse the work motivation of students and motivate them to
learn.
4. Accuracy of the information that you are viewing means and accuracy.
5. Account the technical characteristics of good learning tool.
6. Taking into account the time way in the classroom.
7. Distance from the formal and routine in the use of teaching aids. (Saad, 2007)
Given the significant technological progress in all areas of our age, which included the
education field, both in educational materials or specialties them, and ways and methods of
teaching and the overall objective of the educational process, educational aids have gone
through the different designations to become a science "has its significance and its offshoots
and objectives of a pedagogical techniques or technology education, where labels were
adopted educational methods in its early stages on the senses, such as education, audiovisual
aids and then called for teaching or for education became known as an audio-visual aids and
then was the introduction of information education technology and care which the
educational process as a whole since the beginning of setting targets educational calendar,
and even benefit from the feedback (Mansour, 1089).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 175
Techniques of education as reflected in educational technology centers as a "systematic
process in designing teaching and learning process, implementation and evaluation in the
light of specific objectives on the basis of research findings in different areas of knowledge
and use of all human resources and other resources available to reach more effective learning
and adequate" (Gady, 2007).
And it becomes a kind of educational methods or means aspiring educational technology,
where e-learning includes various types of educational methods and forms of texts, films,
pictures, etc., and this is what made the computer revolution in the nineties of the twentieth
century, rapid progress invaded by all areas inclusive of the process teaching and learning,
and became teachers at all stages of education in developed countries use the Internet,
classrooms and labs with multi-media education in the learning process and if we move on to
schools and universities in the Arab countries, we find that the educational process is still in
the classroom and the teacher based on the source of information and are based on traditional
methods book and a blackboard as well as some means of educational old . (Al Jarf, 2001 &
Barakat, 2009).
The most important benefits of e-learning are:
1. Increase the possibility of communication between the students among themselves and
between students and the school.
2. Easy access to the teacher.
3. Suitability of different learning styles.
4. Provide a curriculum throughout the day and every day of the week.
5. Ease and multiple methods of assessing the development of the student.
6. Access to information in an easy and fast.
7. Taking into account the individual differences between students. (Al-Shammari, 2007)
The World Summit on the Information Society held in Geneva in December (2003) to
increase the contribution of ICT in achieving the goal of education for all throughout the
world, and put a plan of action which included the following:
1. Develop domestic policies to ensure the integration of information and communication
technology fully in education and training at all levels, including curriculum development
and teacher training, administration and management of educational institutions, support
the concept of lifelong education.
2. Develop distance learning, distance training, and other forms of education and training as
part of capacity-building programs, with special guidance to developing countries,
especially LDCs in different levels of development of human resources (Amogdoy, 2008)
Malkawi, Nejadat, (2007) confirmed the revolution in communications and information
technology and systems have brought about sweeping changes is very important in the world,
and began to know the relative values of the rise, and entered a key element in knowledge
production, and decreased the importance of traditional factors of production, raw materials
and information is becoming Group More importantly, I mean that knowledge capital has
become more important and deeper impact of physical capital in the world is moving towards
knowledge-based economy plagued Symbolism, and the new goal of education is no longer
the acquisition of knowledge, but more importantly, the ability to collect access to their
original sources and using them to solve problems, and the ability to ask questions in this
changing world rich possibilities and alternatives outweigh the importance of the ability to
answer, a collection of knowledge and mastery, also requires a secure life in the information
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 176
age, the availability of high capacity and awareness of the renewed Arab teacher in dealing
with the information and requirements, helping to develop the capacity the teachers make the
best use of information by searching for efficient ways to deal with and make the best use of
them .
There are also many studies have focused on training programs for in-service teacher
education in various stages of study on the use of technology in teaching and learning
processes, including the study carried out by Fletcher and Atkinson (1972), where they
compare (44) pairs of identical children in first grade two equally house males and females
and the computerized teaching children experimental group of 5 x 10 minutes per day for 5
months, except it was the curriculum they use similar "to approach the experimental group
which has learned a part-time computerized earlier from the group control equivalent to 5
months in the level grades for reading and one year after the experimental group were
superior to the control group, equivalent to 4,04 months, although it has not been
computerized learning in the second year .(Obuallam, 2004)
As study conducted by Domi (2008) that the E-learning or the use of educational technology
does not mean the abolition of the role of the teacher, his role becomes even more important
and more difficult, it is a creative person with a high efficiency of the educational process
runs successfully, and works to achieve the aspirations of progress and technology.
Al-Shammari (2007) noted that there are three major roles to be performed by the teacher
during the use of e-learning, namely:
1. The role of the interpreter by using technical means.
2. The role of encouraging interaction in the educational process.
3. Role of encouraging the generation of knowledge and creativity.
The effect of the new roles of teacher-mail also "provide a number of training needs and that
contribute to increased professional and technical competence of the teacher and help him to
perform his various roles and dealing with technology and use of modern skills in the
education process for teachers in the field of e-learning as follows:
1. Computer needs related to culture: their
a. needs related to the skills of computer use,
b. needs related to culture information.
2. Needs in how to deal with programs and network services.
3. Needs on how to prepare decisions electronically: and include the
a. needs in the planning and design,
b. needs in the calendar,
c. needs in the management decision on the network.
The researchers believes that the roles of the teacher in e-learning is different than their roles
in traditional education, education-mail requires the presence of qualified teachers trained to
deal with him and his good employment in education, it also requires them to do the roles and
functions commensurate with the new requirements, as there are traditional methods that used
by the teacher during the era of meaningful information and technological developments, but
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 177
the teacher should develop the same capabilities and to cope with the variables of the current
era.
References
Abdeen, Mohamed Abdel Kader (2008). The training needs of teachers in Arab schools
inside Alakzer from the perspectives of teachers and managers. Journal of Educational
and Psychological Sciences, University of Bahrain, folder (9), number (2).
Abu Russ ,Mohammad Hadi (2001). Identification of training needs for teachers of grades
four main first public school district of Nablus. Master Thesis, Faculty of Education, An
Najah National University, Palestine.
Al Harbi, Abdul Rahim Bin Tuwaijri Sami ( 2004 ). Training Needs For Teachers Of English
In Qassim. Master Thesis, University Of King Ibn Saud .
Al jarf, Rima Saad HE, (2001). Requirements of the transition from traditional education to
e-learning. scientific paper given at the Eighth Conference of the Egyptian Society of
curricula and teaching methods, entitled ((curricula and the knowledge revolution and
technological powers)), Cairo.
Al-Shamir, Fawaz, (2007). The Importance Of Barriers To The Use Of E-Learning Teachers
From The Standpoint Of Educational Supervisors In Jeddah. Master thesis Unpublished, ,
Umm Al Qura University, Ministry Of Higher Education, Saudi Arabia.
Alakalpy, Mufleh Bin Dakhil, (2003). The Degree To Which Student The Teacher Of Islamic
Education In Teacher Colleges Of The Production And Use Of Tools And Techniques Of
Teaching. Unpublished Master, Umm Al Qura University, Ministry Of Higher Education,
Saudi Arabia .
Ali, Mahmoud (2002). Effective Teaching. House Of Society For Publication And
Distribution, Jeddah, Saudi Arabia.
Amogdoy ,Hamid, (2008). The Effectiveness Of Supervision In The Performance Of E-
Educational Teachers Of Mathematics. Master Thesis Abstract, Department Of
Curriculum And Instruction, Faculty Of Education, Umm Al Qura University, Saudi
Arabia.
Barakat, Walid Fathalla, (2009). Development of computer for the teacher as a prelude to an
e-learning. Paper given at the Conference ((a new vision towards the development of the
teacher)), Jordan.
Gady, Iman Bint Ammar (2007). And The Fact Of The Use Of Educational Methods And
Modern Techniques In Teaching English At The Intermediate Stage From The Viewpoint
Of The English Language Supervisors And School Principals In Maka. Thesis Master
Unpublished , Umm Al Qura University, Saudi Arabia , Saudi Arabia.
Khatib, Mohamed Ibrahim (2006). A Field Study On The Training Needs Of Professional In-
Service Teachers Of The Arabic Language In The Second Cycle Of Basic Education In
Zarqa, Jordan. Journal Of Educational And Psychological Sciences. University Of
Bahrain. Folder (7). Number (4).
Malkawi, Mahmoud and Salam Nejadat, (2007). The Challenges Of Arab Education In The
Twenty-First Century And Its Impact In Determining The Future Role Of The Teacher.
The University Of Sharjah Journal Of Forensic Sciences & Humanities, University Of
Sharjah, A Folder (4), Number (2).
Mansour, Ahmed, (1989). Technology education and development of the ability to Creative
Thinking 2. The fulfillment house for the publication and distribution.
Mansour, Toxicity (2003). A Comparative Study Of System-Service Teacher Training In
Schools In England And The United States And The Possibility To Utilize Them In The
Syrian Arab Republic. Summary Of Ph.D. Thesis, Department Of Comparative Education
And Education Administration, College Of Education, University Of Damascus.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 178
Najjar, Mohamed Abdel Wahab (2007). Academic Accreditation Of Teacher Training
Institutions As A Means Of Quality Assurance In The Public Educational Institutions.
Working Paper Submitted To The Fourteenth Annual Meeting Of Saudi Association For
Psychological Science And Education (Justin), Under The Slogan "Quality In Public
Education", King Saud University , Saudi Arabia.
Obuallam, please Abu Alam, (2004). Learning and its applications. Dar march for
publication and distribution, Amman, Jordan.
Saad, Mahmoud Hassan, (2007), "education process between theory and practice", Dar Al-
Fikr, Jordan.
Samour, Riad Yussef (2006). The Role Of The School, "And The Training Unit In The
Professional Growth Of Teachers. Journal Of The Islamic University ((A Series Of
Humanities)) Folder (14), Number (2).
Sharif, Said and Hanan Ghanem Sultan Issa (1983). Contemporary trends in in-service
training. Dar Al Uloom, Jordan.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 179
THE DESIGN AND IMPLEMENTATION OF THE MALAY-ARABIC ONLINE
MULTIMEDIA DICTIONARY ON SMART PHONES.
Khirulnizam Abd Rahman, Azrehan Abd Aziz, Syuria Amirrudin,
Juzlinda Mohd Ghazali, C. W. Shamsul Bahri C. W. Ahmad, Mohamad Haron Husaini
Kolej Universiti Islam Antarabangsa Selangor
Bandar Seri Putra, 43600, Bangi, Selangor, Malaysia
khirulnizam@gmail.com
Abstract
There are a lot of dictionaries available in the market. However, its hard to find a Malay-
Arabic dictionary complete with picture or video to visualize what is the word represent, and
pronunciation in voice. Thus, the researchers developed and implemented a Malay-Arabic
online multimedia dictionary for beginner (OMMAr). The user is able to enter a Malay word
and if the word matches any of the entry in the database system, the meaning in Arabic will
be displayed with the picture or video and the sound for the word pronunciation. If there is no
match, the system will propose similar words. The system is also capable of the doing the
same for Arabic words. The technology used is client-server technology where the mobile
device (Smartphone) is the client, and there is a web server to facilitate the lookup table
(database) and storage for the audio-visual aids. This paper will present the design of
OMMAr on Smartphone which uses the UTF-8 character encoding to store the Arabic words.
There is a special treatment to the web pages, the web server, and also the database. The web
pages use UTF-8 HTML encoding while the web server needs a special function to translate
the HTML code into UTF-8. To store the Arabic characters, the databases collation also
need to be set to UTF-8. The authors use the Flash format for the videos and the sounds,
while the images are in JPEG, GIF or PNG format. This paper is to report the design,
implementation and testing of the systems user interface on several popular Smartphone
devices.
Keywords: online dictionary, Malay-Arabic online dictionary, UTF-8 characters transaction,
online multimedia dictionary, mobile based dictionary.
1. Introduction
Dictionary is a book that lists the words of a language in alphabetical order and gives their
meaning, or their equivalent in a different language (Oxford Dictionary). Since dictionary is
supposed to be a book (as defined by Oxford Dictionary), so a dictionary that is available
online, such as Merriam-Webster.com, is an online dictionary. As the word online is also
related to computer, this online dictionary must also possess the fast searching features. What
the researchers are doing is to capitalize the strength of computer processing to enhance the
old version of dictionary (in papers) into a rich multimedia dictionary. The application is
equipped with the audio of the words pronunciation to help the user pronounce the word and
pictures or video to visualize what the word represents.
Evolution of information technology and communication (ICT) today did affect many
development of dictionary that can be installed and used in mobile devices. There are several
example of dictionary that can be accessed through mobile. There are LookWAYup mobile
dictionary (http://lookwayup.com), SABC Mobile Dictionary (Mobidic)
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 180
(www.sabcmobile.co.za/mobidic.htm), MOT Mobile Dictionary (www.kielikone.fi/en) and
MSDict English Phrases Dictionary (S60) 4.10 (www.brothersoft.com/mobile/msdict-
english-phrases-dictionary - (s60)). This all version of dictionaries build in type of software
that can be access through mobile. LookWAYup is a one of website that provide online
dictionary and its suitable for all types of society. LookWAYup also provide online
dictionary for wireless PDA or mobile namely LookWAYup mobile dictionary. This
dictionary provides ease of translation variety language like French to English, German to
English, Spanish to English and on the other hand SABC Mobile Dictionary (Mobidic) is the
one in South Africa. MobiDic allow mobile user to access the dictionary contents through
their mobile. It requires user to send SMS that contain words to be translated to the number
provided and received a suitable meaning.
Besides that there are some versions of dictionary that need to be installed into mobile as a
program like MOT Mobile Dictionary. These dictionary was developed to help business user
to use language in their daily job. For MSDict English Phrases Dictionary (S60) 4.10, it has
many phrases, word arrangements and basic quotes.
2. The challenges
2.1 Information retrieval for Arabic characters in the Web.
We face difficulties to manipulate the Arabic words, especially in the process of saving and
searching the word entries. So we use one of the Unicode character sets, which is the UTF-8
to represent the Arabic words. However, UTF-8 character sets need some special treatment to
manipulate them correctly in the Web environment. The problem and solution is thoroughly
discussed by Khirulnizam et al., 2008 [CAMP2008].
2.2 Producing the multimedia elements.
The researchers produce the images and the sound manually. The sound is developed in a
recording studio, where voice is recorded, edited and noise is filtered manually. There are
technologies available to automatically convert text (Malay or Arabic) into sound; such as
Malay TTS by Tan (2004), SMaTTS by Othman et al. (2007) and ATTS by Elshafaei (2004).
However we have not looked into it seriously. The images are also developed manually.
2.3 Producing the mobile version.
The previous system is available in regular web interface. However for the mobile device
version, the system needs to be downgraded to suit the small screens. The JavaScript
onscreen keyboard application is also customized. Another problem that occur is the Flash
application to produce the sound. Since the application is in Flash, there are several smart
phone devices that do not support it such as iPhone. This is the main challenge that has not
been resolved yet.
3. Design of the Proposed System
The system is developed using PHP script as the middleware, running on Apache web server.
The interfaces are on HTML and the database is residing in MySQL 5 database server.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 181
3.1 Schematic Diagram
Figure 1: The schematic diagram of the application.
3.2 The database design
The entity relationship diagram in Figure 1 is the database design. We use the MySQL
version 5 because it has the capability to handle UTF-8 character set which is a must have
feature since we store Arabic characters.
Figure 2: The entity-relationship diagram of the database.
Client-side Server-side
Network
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 182
3.2 Functional flow
Figure 3: The applications functional flow.
3.1.1 Malay words entry
Table MalayWords contains the field to hold the values of Malay words, the root word,
meaning of the word and the file path for the audio visual aids (image, pronunciation and
video). It also has the information of the word type; whether its a noun, verb or adverb.
User key-in word (Malay or
Arabic)
Send the word to the server
Search for the word
Word
found
Send the translation / voice/
animation / video to the
client
Yes
No
Send no match found
message
Suggest similar words
Begin
End
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 183
The multimedia elements for this system are not directly saved to the database. The files are
located in another directory in the systems directory. The information saved in the database
is only the file names.
3.1.2 Arabic words entry
Another important table is to hold the word entry for Arabic, the meaning, the word with
diacritic, the root word and the file path for the audio visual aids (image, pronunciation and
video). The diacritic version of the word is also provided in case the audio file is not available
or not working properly. Diacritic is a special notation in Arabic character to help non-Arabic
tongue to easily recognize the correct pronunciation of the word.
3.1.3 The Word-Joiner
This table is actually a composite entity derived to link a Malay word to the meaning in
Arabic, and vice-versa.
3.2 The systems algorithm
This system has two major search features; the Malay, and the Arabic word search. Figure 4
shows the algorithm for the Malay word searching. This section will display the Arabic word
or the suggested similar Arabic word to the user. It also provides the image and the audio aid
of the words pronunciation.
Figure 4: The Malay word search algorithm.
Figure 5 is the algorithm used in doing the search for Arabic word. The user will get the
Malay word as the output, and all the audio and visual aids.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 184
Figure 5: The Arabic word search algorithm.
4. Testing
4.1 The web interfaces
These are the screen shots taken from the application prototype that has been developed
(Figure 6, 7, 8 and 9). Figure 7 is the interface to receive user request to search Malay word.
User has the option of selecting the exact word, contains the search request or begins with the
search request.
The result of the search is displayed in Figure 8 if the word is found. Click lanjut (details) to
view the multimedia content. All the voices and image is displayed in Figure 9.
The keyboard is provided in Arabic search request page, Figure 10. This keyboard is to
facilitate the user who does not have the physical Arabic keyboard.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 185
Figure 6: Interface for Malay-Arabic Online Mobile Dictionary
Figure 7: The user interface to enter the Malay word by the user.
Figure 8: The search result.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 186
Figure 9: The audio and visual support to represent the word.
Figure 10: The user interface to enter the Arabic word by the user.
4.2 Testing the interface under several popular mobile devices.
The testing was done only on mobile device environment using three types of mobile devices
which are Symbian, iPhone, and Windows Mobile. The result is as shown in Table 1. The
symbol represents capable, while X is unable to perform.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 187
Table 1: The testing of the application interfaces against several popular mobile devices.
Functions
Platform
Symbian
(Nokia E63)
iPhone (using
Safari on
iPhone 3Gs)
Windows Mobile
(Mobile IE on
HTC Touch)
Display Arabic
words
Receive Arabic
words
Search Arabic
words
Arabic on-page
keyboard
Pronunciation X
5. Discussion on Prototype Testing
Most of Smartphones browser that support Unicode and Flash will not have problems in
accessing the application. By default iPhone does not support Flash. Thats the main reason
why the pronunciation does not perform properly on iPhone. The pronunciations interface is
developed using Flash.
The testing provides a positive outcome for this prototype application. There are a lot more
platform to test. Another future work is to add more entries, develop more audio, visual aid
(animation and video) for more Arabic and Malay words. The prototype is accessible from
http://bit.ly/mommar/ .
6. Acknowledgement
This research is funded under the Research and Development grant, provided by Kolej
Universiti Islam Antarabangsa Selangor, Bandar Seri Putra, Bangi, Selangor.
References
Elshafei, Moustafa, Al-Muhtaseb, Husni and Al-Ghamdi, Mansour. 2002. Techniques for
high quality Arabic speech synthesis. Journal of Information SciencesInformatics and
Computer Science,Volume 140 , Issue 3, pages 255 - 267.
Khirulnizam A. Rahman, Syuria Amiruddin, Che Wan Shamsul Bahri Che Wan Ahmad, Wan
Harun Hussaini, and Siti Zaharah Mohid. 2008. Solving the Arabic UTF-8 Characters
Transaction Issues in an Online Malay-Arabic Dictionary. Proceeding presented in National
Conference on Information Retrieval and Knowledge Management (CAMP08), 18 March
2008, Kuala Lumpur, Malaysia.
Khirulnizam Abd Rahman, Che Wan Shamsul Bahri Che Wan Ahmad, Juzlinda Mohd
Ghazali, Syuria Amirrudin, Siti Zaharah Mohid, Dr. Muhammad Haron Husaini (2008)
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 188
Proposal Pembangunan Kamus Melayu-Arab Bermultimedia Berasaskan Telefon Mudah-
Alih.
Othman Khalifa, and Zakiah Hanim Ahmad. 2007. SMaTTS: Standard Malay Text to Speech
System. International Journal of Computer Science, 2 (4). pp. 285-293. ISSN 2070-3856.
Accessed on 28 December 2008, from http://www.waset.org/ijcs/v2/v2-4-40.pdf.
Tan, Tian Swee. 2004. The design and verification of malay text to speech synthesis
system. Masters thesis, Univeriti Teknologi Malaysia. Accessed on 28 December 2008 from
http://eprints.utm.my/4000/1/TanTianSweeMED2004TTT.pdf .
SABC Mobile Dictionary, http://www.sabcmobile.co.za/mobidic.htm. Accessed on 14
February 2009.
MOT Mobile Dictionary, http://www.kielikone.fi/en/. Accessed on 14 February 2009.
MSDict English Phrases Dictionary (S60) 4.10, http://www.brothersoft.com/mobile/msdict-
english-phrases-dictionary-(s60)-1265.html. Accessed on 14 February 2009.
LookWAYup mobile dictionary, http://lookwayup.com. Accessed on 14 February 2009.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 189
KESEPADUAN ILMU DALAM TMK ; SATU SEMAKAN SEMULA
Noor Hisham Md Nawi
hisham@umk.edu.my
Abstract
There are various form of interpretations about a concept of knowledge integration. The
concept of knowledge integration from Islamic and western perspective is totally different. In
fact, the concept of knowledge integration among Muslim scholars is also unanimous.
Different interpretation will entail different impacts on the education system and its
application which includes the field of ICT. This working paper will be discussing various
concepts of knowledge integration and its connection to the field of ICT. Besides that, it will
also make a comparison between the concept of knowledge integration and Islamization of
knowledge and its reciprocal relationships among them. The working paper will also propose
the concept of knowledge integration and its relation with ICT and the steps that should be
taken into account to implement the concept of knowledge integration in education system
particularly in higher education institution. Finally, knowledge integration and ICT will be
associated with the concept of studying (berguru).
Keywords: Knowledge integration, Islamization of knowledge, information and
communication technology, the concept of studying (berguru).
Definisi Ilmu
Sebelum meneroka lebih jauh, pengertian ilmu perlu difahami dengan jelas lebih-lebih lagi
dalam era ledakan ilmu pengetahuan dan teknologi maklumat dan komunikasi (TMK).
Perbincangan mengenai konsep dan pengertian ilmu sangat luas. Apakah itu ilmu? Frank
Rosenthal (1970) telah membincangkannya dengan panjang lebar dengan mengemukakan
107 buah definisi ilmu yang dibahagikan kepada 12 kategori. Dalam pengertian Barat moden,
terdapat tiga aliran pemikiran utama yang berusaha menanggapi pengertian ilmu. Mazhab
empirisisme yang didokong John Locke, David Hume dan lain-lain berpegang teguh kepada
kaedah sains di mana ilmu merujuk kepada pengenalan tentang fakta. Fakta pula merujuk
kepada perkara yang boleh ditanggapi oleh pancaindera zahir. Mazhab rasionalisme pula
seperti Socrates, Plato dan Descartes menumpukan perhatian kepada prinsip kekal yang
diperolehi samada melalui akal rasional atau pun agama. Pertembungan antara dua mazhab
ini telah melahirkan mazhab baru iaitu pragmatisme. Mazhab yang didokong oleh Charles,
William James dan John Dewey melihat ilmu sebagai satu proses yang berdasarkan
percubaan dan pengalaman, bukan berdasarkan prinsip besar atau utama. Justeru, ilmu itu
lebih merujuk kepada proses bukan kepada kandungannya. Secara keseluruhannya kesemua
mazhab tersebut mengabaikan peranan wahyu sebagai sumber ilmu dan tidak meletakkannya
sebagai sumber tertinggi pemerolehan ilmu. Menurut al-Attas (1978) kekaburan dan
ketidaktepatan konsep ilmu yang dipimpin oleh pandangan alam Barat sekular telah
mengakibatkan banyak kezaliman kepada kehidupan manusia dan alam. Dengan bantuan
TMK, manusia pada hari ini sememangnya mengetahui banyak perkara. Namun kebanyakan
perkara yang diketahuinya itu tidak memasukkan hakikat-hakikat penting dalam kehidupan
seperti kewujudan Tuhan, hari pembalasan, roh dirinya sendiri dan lain-lain yang hanya dapat
diketahui melalui sumber wahyu.
Ilmuan Islam mempunyai pandangan yang pelbagai tentang pengertian dan konsep
ilmu. Umumnya mereka bersepakat bahawa semua sumber ilmu pada hakikatnya datang
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 190
daripada sumber yang satu. Ruang lingkup ilmu amat luas dan tidak terbatas. Oleh itu ilmu
yang sempurna atau mutlak adalah milik Allah. Menurut Wan Mohd Nor (1994) ilmu dalam
perspektif Islam dikenali sebagai sifat, proses dan hasil. Justeru itu, istilah ilmu dalam Islam
menegaskan bahawa tidak wujud sebarang pertentangan antara proses dan kandungan dan ia
meliputi pelbagai perkara dan maksud seperti Al-Quran, syariah Islam, sunnah, Islam, iman,
ilmu kerohanian (ilmu al-laduni), hikmah, makrifat, pemikiran, sains dan pendidikan. Sebagai
landasan perbincangan, penulis memilih takrifan ilmu yang dikemukakan oleh al-Attas. Al-
Attas (1978) mentakrifkan ilmu dengan mengemukakan semula takrif Fakhruddin Al-Razi
dalam bentuk yang diperbaiki dan diubahsuai sebagai; apabila merujuk kepada Allah
sebagai sumber segala ilmu, ia (ilmu) adalah ketibaan makna bagi sesuatu ke dalam diri
seseorang. Sebaliknya apabila merujuk kepada diri sebagai pentafsir, ilmu adalah ketibaan
diri seseorang kepada makna tentang sesuatu. Takrifan ini membawa maksud bahawa Allah
adalah sumber sebenar ilmu dan manusia adalah makhluk aktif yang berusaha mendapatkan
ilmu. Oleh itu semua ilmu bertolak daripada premis tauhid iaitu ilmu terbit daripada sumber
yang satu.
Takrifan tersebut memberi beberapa implikasi penting. Sesuatu itu dikatakan ilmu
jika ia berdasarkan maklumat yang benar dan memberi makna kepada pemiliknya. Ini
bermakna ilmu tidak sama dengan fakta, teori, kemahiran atau maklumat walaupun ilmu
tentunya meliputi maklumat dan kemahiran. Maklumat yang tidak tersusun secara sistematik
belum mencapai tahap ilmu. Justeru, teknologi maklumat dan komunikasi (TMK) tidak
disebut sebagai ilmu walaupun ia menawarkan pelbagai maklumat yang rencam bentuknya.
Komputer yang amat canggih dan memiliki keupayaan menyimpan maklumat yang sangat
banyak juga tidak dianggap sebagai berilmu kerana maklumat tersebut tidak memberi apa-
apa makna kepadanya. Berdasarkan hujah sebelumnya, Abdul Rahman (2005) menganggap
ledakan ilmu pengetahuan itu sebenarnya lebih merupakan ledakan maklumat sahaja.
Takrifan itu juga memperakukan bahawa sumber ilmu itu pelbagai dan boleh dikelaskan
kepada lima jenis iaitu pancaindera, akal, intuisi, ilham dan wahyu. Dengan menyepadukan
sumber metafizik dengan sumber empirikal dalam satu sistem hierarki yang berlandaskan
prinsip tauhid, tradisi keilmuan yang berasaskan epistemologi Islam bebas daripada tiga
permasalahan besar yang melanda tradisi keilmuan Barat moden iaitu masalah pandangan
atomisme (juzi), dualisme (pemisahan kepada dua) dan skeptisme (keraguan). Al-Attas
adalah antara ilmuan Islam yang secara konsisten menganjurkan agar sistem pendidikan
umat Islam mengambil kira semula secara jelas konsep klasifikasi dan hierarki ilmu secara
tepat khususnya pembahagian ilmu fardhu ain dan ilmu fardhu kifayah untuk menjaga
peradaban Islam daripada kehilangan identitinya di bawah pengaruh pensekularan ilmu.
Kesepaduan Ilmu
Konsep kesepaduan ilmu turut dibincang oleh tokoh-tokoh ilmuan Barat (Haught 1995 ;
Robert & Kellough 2000). Setiapnya mengupas kesepaduan ilmu dalam konteks yang
berbeza-beza dan tersendiri berdasarkan disiplin masing-masing. Menurut Fuller (2001),
kesepaduan ilmu seharusnya difahami sebagai proses sosial. Berlatar belakangkan bidang
sosiologi, Fuller melihat kesepaduan ilmu dari sudut sejarah sosiologi boleh disorot melalui
dua perspektif. Pertama, kesepaduan ilmu dilihat sebagai proses pembangunan ilmu secara
semulajadi samada secara induktif atau deduktif. Kedua, kesepaduan ilmu adalah sesuatu
yang tidak asli kerana kecenderungan ilmu untuk mencapah dan berkembang secara
pemecahan. Dalam konteks pendidikan, kesepaduan ilmu dilihat dalam tiga pendekatan
iaitu kesepaduan beberapa disiplin ilmu (interdisciplinary), kesepaduan dalam pelbagai
disiplin ilmu (multidisciplinary) dan kesepaduan melampau disiplin-disiplin ilmu
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 191
(transdisciplinary) (Drake 1991). Konsep kesepaduan ilmu telah pun dilaksanakan di pelbagai
institusi pendidikan dan mendapat maklumbalas yang pelbagai. Walaupun diakui bahawa
konsep kesepaduan ilmu memberi banyak kebaikan kepada para pelajar, pakar-pakar
pendidikan turut memberi perhatian besar untuk mengurangkan impak negatif daripada
proses kesepaduan tersebut seperti pengabaian aspek kedalaman dan ketepatan sesuatu
bidang ilmu serta hubungan isi yang longgar antara pelbagai disiplin ilmu (Ingram 1979 ;
McNeil 1996). Secara keseluruhan, konsep kesepaduan ilmu difahami secara berbeza-beza
oleh tokoh-tokoh pendidikan Barat berdasarkan disiplin ilmu masing-masing dengan
perspektif yang pelbagai. Kepelbagaian tersebut tidak pula diikat atau disatukan oleh mana-
mana prinsip-prinsip yang dipersetujui bersama.
Salah satu ciri penting pengertian ilmu menurut perspektif Islam ialah sifat
kesepaduannya. Kesepaduan ilmu terpancar dari epistemologinya yang mengiktiraf lima
sumber ilmu dengan martabat yang berbeza. Sebahagiannya bersifat kebenaran mutlak dan
sebahagiannya bersifat relatif. Disepakati bahawa semua sumber ilmu tersebut hakikatnya
datang dari Allah (Yang Maha Alim) yang disampaikan kepada manusia dalam bentuk yang
beragam. Justeru, ilmu yang sempurna atau mutlak adalah milik Allah. Oleh kerana
puncanya satu, maka sekalian ilmu akhirnya akan kembali kepada sumber asalnya yang satu
(tauhid ilmu). Kefahaman ini memberi implikasi terhadap kesatuan dan kesepaduan semua
sumber dan matlamat epistemologi. Berpunca dari kesedaran ini, ilmuan Islam di sepanjang
zaman telah menghasilkan banyak penulisan mengenai pengelasan ilmu (maratib al-ulum).
Mereka berusaha menyusun pelbagai disiplin ilmu menurut skema keutamaan. Dalam
pandangan alam Islam, ilmu boleh dibahagikan kepada beberapa pembahagian dan
pengelasan berdasarkan kepada pelbagai dimensi. Ramai pemikir Islam terdahulu dan
kontemporari telah menformulakan beberapa bentuk klasifikasi ilmu. Osman Bakar (1992)
menyatakan bahawa klasifikasi ilmu yang terkenal ialah yang dibuat oleh Al-Farabi (870
950 M), Al-Ikhwan Al-Safa, Ibn Sina (980 1037 M), Al-Ghazali (1058 1111M) dan Ibn
Khaldun (1332 1406 M).
Pada zaman sekarang perbincangan mengenai kesepaduan ilmu diangkat kembali
dan sangat signifikan untuk menghadapi krisis keilmuan khususnya sekularisme dan dualisme
pendidikan. Sebahagian besar ilmuan Islam yang melihat bahawa krisis tersebut sebagai
punca kemunduran umat menyeru supaya sistem pendidikan umat Islam disemak semula.
Dalam konteks tersebut, konsep kesepaduan ilmu mula dibincangkan semula secara meluas.
Ramai tokoh ilmuan kontemporari seperti al-Faruqi (1989), Abdul Hamid Abu Sulayman
(1994) Taha Jabir al-Alwani (1994) dan Shahahir Mohd Zain (1984) memberi penumpuan
kepada aspek kesepaduan ilmu dalam bentuk kesepaduan ilmu naqli dan aqli atau ilmu
warisan Islam dan sains moden sekular. Di samping itu, terdapat sebahagian daripada para
ilmuan seperti al-Attas (1978), Syed Ali Ashraf (1994), Hassan Langgulung (1995) dan
Mohd Syukri Salleh (1984) memilih konsep kesepaduan ilmu yang merujuk kepada
kesepaduan antara ilmu fardhu ain dan ilmu fardhu kifayah. Ilmu fardhu ain adalah ilmu teras
agama yang mengandungi kebenaran mutlak, disampaikan melalui perantaraan wahyu,
mengisi keperluan rohani manusia, mengandungi panduan-panduan yang bersifat abadi dan
diwajibkan ke atas setiap orang untuk mengetahui dan mempelajarinya. Manakala ilmu
fardhu kifayah pula memenuhi keperluan intelek dan emosi serta berkaitan dengan kehidupan
dan kemakmuran dunia. Setiap bahagian tersebut mempunyai fungsi-fungsinya yang
tersendiri dan perlu diletakkan pada tempatnya yang betul. Dewasa ini, al-Attas (1978) telah
mengangkat kembali martabat ilmu fardhu ain dengan mengembalikan fungsinya sebagai
teras dalam sistem pendidikan umat khususnya di peringkat pengajian tinggi. Justeru,
kesepaduan ilmu menurut perspektif Islam bukan sekadar memasukkan semua jenis ilmu
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 192
pengetahuan dalam satu bekas yang sama tanpa sebarang hierarki dan fungsinya yang
tertentu. Kesepaduan ilmu yang dimaksudkan ialah kesepaduan klasifikasi dan hierarki ilmu
sekaligus di mana setiapnya diletakkan mengikut kategori dan hierarkinya yang wajar,
disepadukan kesemuanya dalam keadaan saling kait-mengait, dimurnikan segala kecelaruan
yang wujud pada topeng-topeng ilmu dan kesemua proses tersebut berpaksikan prinsip
tauhid.
Kesepaduan Ilmu Dan Hubungannya Dengan Gagasan Islamisasi Ilmu Moden
Dalam konteks epistemologi ilmu dalam Islam, perkembangan ilmu fardhu kifayah perlu
berpaksikan kepada ilmu fardhu ain. Walau bagaimanapun, ilmu fardhu kifayah yang
berkembang pesat masa kini (merujuk khusus kepada ilmu sains moden Barat) terpisah dari
paradigma tauhid (Ashraf 1981; al-Attas 1978). Ini menjadikan proses kesepaduan ilmu
fardhu ain dengan ilmu fardhu kifayah tidak lagi dapat dilakukan dengan mudah. Justeru
proses kesepaduan ilmu di peringkat IPT memerlukan satu pendekatan yang jitu dan tepat.
Jika ia tidak dilakukan dengan sempurna, proses tersebut hanya akan mengulangi kesilapan
yang sama iaitu mengekalkan kesinambungan keterpisahan ilmu naqli dan aqli. Untuk itu,
lahir gagasan Islamisasi ilmu moden yang cuba merungkaikan permasalahan umat Islam
dengan memberi tumpuan kepada agenda pendidikan (Mohd Nasir Omar 2001). Premis
Islamisasi ilmu ialah ilmu sains moden kini tidak bersifat neutral kerana ia telah dipengaruhi
oleh pandangan keagamaan, kebudayaan dan filsafat manusia Barat.
Kesepaduan ilmu dan Islamisasi ilmu pada dasarnya adalah perkara yang sama. Pun
begitu konsep kesepaduan ilmu bersifat lebih umum manakala Islamisasi ilmu pula lebih
mengkhusus. Ini bermakna bahawa tidak semua konsep kesepaduan ilmu boleh dikaitkan
dengan Islamisasi ilmu tetapi sebaliknya pula bagi gagasan Islamisasi ilmu. Walau
bagaimanapun, tujuan dan matlamatnya adalah sama. Hubungan antara keduanya juga boleh
dilihat dari sudut bahawa konsep kesepaduan ilmu diperlukan di semua peringkat pendidikan
khususnya di peringkat rendah dan menengah. Manakala gagasan Islamisasi ilmu pula
diperlukan di peringkat pendidikan tinggi bagi menghadapi cabaran perkembangan ilmu
pengkhususan yang semakin kompleks. Setiap konsep tersebut (kesepaduan ilmu dari
perspektif Islam dan Islamisasi ilmu) mempunyai pendekatan yang pelbagai walaupun dasar
dan matlamatnya adalah sama. Kepelbagaian konsep kesepaduan ilmu telah dijelaskan
sebelumnya. Menurut Syed Azad Syed Attar (1998), gagasan Islamisasi ilmu juga
mempunyai pelbagai pendekatan walaupun matlamatnya adalah sama. Kepelbagaian
pendekatan tersebut berkait rapat dengan pendefinisian Islamisasi ilmu yang dikemukakkan
oleh tokoh-tokoh berkenaan. Antara tokoh-tokoh penting tersebut ialah Syed Muhammad
Naquib al-Attas (1978), Ismail al-Faruqi, al-Alwani (1995), Ziauddin Sardar (1984), Abu
Sulayman (1994), Shaharir Mohamad Zain (1984), Hassan Langgulung (1984), dan Ragab
(1995). Dikemukakan dua pendekatan yang masyhur dalam gagasan Islamisasi ilmu secara
ringkas iaitu pendekatan al-Attas (1978) dan al-Faruqi (1982). Proses dan kaedah
pelaksanaan gagasan Islamisasi ilmu moden menurutt al-Attas (1978) melibatkan proses dua
tahap; iaitu pembebasan diri dan pengembalian diri kepada kejadian asalnya (fitrah). Tahap
pertama ialah penyingkiran segala elemen dan konsep yang mencirikan peradaban Barat
dalam setiap cabangan ilmu pengetahuan. Manakala tahap yang kedua ialah proses
memasukkan elemen-elemen dan konsep-konsep Islam dalam setiap cabangan ilmu. Apabila
pemikiran telah dibebas dan dibersihkan maka ia kembali kepada fitrahnya yang asal iaitu
mengakui hakikat dan kebenaran. Pendekatan al-Faruqi pula melibatkan 12 langkah yang
amat masyhur yang diringkaskan oleh Yasin (1993) kepada tiga proses berikut. Pertama,
seseorang itu haruslah menguasai ilmu Barat moden dan berupaya membuat penilaian dan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 193
kritikan terhadap ilmu-ilmu ini dari segi kaedah dan nilai-nilai yang terkandung di
dalamnnya. Keduanya, seseorang itu juga haruslah menguasai ilmu Islam dan membuat
penilaian dari segi perspektif Islam, keperluan ummah pada masa ini dan pengetahuan moden
terkini. Ketiga, menjalankan sintesis yang kreatif di antara ilmu-ilmu Islam dan ilmu-ilmu
moden.
Kesepaduan Ilmu dan TMK
Penggunaan TMK yang begitu meluas pada hari ini bukan sahaja telah mengubah gaya hidup
manusia, bahkan juga proses keilmuan. Teknologi maklumat adalah teknologi yang
digunakan untuk memperolehi, memproses, menyimpan, merekod, menganalisis dan
memanipulasikan data dan maklumat. Teknologi komunikasi pula adalah penggunaan
teknologi untuk menghubungkan atau menyampaikan data dan informasi dalam bentuk teks,
grafik, audio, video dan animasi atau secara kombinasi bentuk-bentuk ini dari seorang
individu kepada individu yang lain dan dari satu tempat ke tempat yang lain. Gabungan
teknologi maklumat dan komunikasi adalah semua bentuk teknologi yang terlibat dalam
bentuk pengumpulan, manipulasi, komunikasi, persembahan dan menggunakan data (dan
data yang ditransformasi kepada maklumat)(Martin et al. 1994). Menerusi TMK, kita
diperkenalkan dengan beberapa istilah dan pendekatan baru dalam pendidikan khususnya
dalam proses pengajaran dan pembelajaran (p&p) seperti e-learning, open university,
pengajian jarak jauh (PJJ), pendidikan interaktif, pembelajaran secara maya dan lain-lain
(Musa Abu Hasaan 2002).
Adakah TMK memerlukan proses kesepaduan ilmu dan Islamisasi ilmu sekaligus?
Jika ya bagaimana dan apakah pendekatan yang patut digunakan? Diyakini bahawa ramai
yang berpendapat TMK sememangnya memerlukan proses kesepaduan ilmu walaupun
mungkin bentuk kesepaduan tersebut tidaklah begitu jelas. Namun adakah TMK juga
memerlukan proses Islamisasi ilmu ? Untuk menjawab persoalan tersebut, konsep ilmu, sains
dan teknologi perlu diperjelaskan. Persoalan tentang ilmu telah diperjelaskan sebelumnya.
Sains adalah perkataan Bahasa Inggeris science yang berasal dari bahasa Latin scentica
yang bermaksud pengetahuan atau ilmu. Menurut Baiquni (1983) sains secara singkatnya
boleh dirumuskan sebagai himpunan pengetahuan manusia yang dikumpulkan melalui suatu
proses pengajian yang dapat diterima oleh akal, ertinya dapat difikirkan untuk dibuat
penilaian. Jadi dapat kita katakan bahawa sains adalah himpunan rasionaliti kolektif insane.
Teknologi adalah istilah yang sering disalah tafsirkan kerana ia sering dianggap sinonim
dengan sains. Teknologi dari segi bahasa berasal dari Yunani iaitu techne yang bermakna
kerja tangan dan logos bermakna wacana atau kajian. Teknologi merupakan ilmu yang
bersifat praktikal berbanding dengan sains yang bersifat teoritikal. Dalam sejarah sains Islam,
teknologi bukanlah sesuatu yang asing di mana ia dikenali dengan istilah sinaah yang
bererti ilmu gunaan. Teknologi ketika itu sangat pesat dan memberi sumbangan yang besar
kepada keagungan Tamadun Islam khususnya sebelum abad ke 16 M. Mudahnya, teknologi
adakah cara atau kaedah atau perkakas yang membuatkan kerja manusia lebih mudah,
selamat, jimat dan efisien.
Manusia kini tidak boleh mengelak lagi dari TMK. Pembangunan TMK berjaya
mengubah hubungan antara tiga dimensi iaitu masa (kepantasan), ruang (jarak) dan kos
(perbelanjaan). Malahan TMK telah menjadi satu budaya, kerjaya dan gaya hidup. Barbour
(2001) telah memberi ingatan bahawa terdapat tiga aliran pandangan mengenai teknologi
iaitu teknologi sebagai pembebas, ancaman dan alat kekuasaan. Pembahagian tersebut
menunjukkan bahawa penilaian terhadap teknologi adalah pelbagai. TMK memberi kesan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 194
positif dan negatif kepada pengguna dan masyarakat. Impak TMK dalam bidang pendidikan
khususnya dalam aspek p&p amat besar. Dari aspek postif, TMK boleh membantu guru
merekabentuk p&p yang kreatif dan inovatif, mengadun pelbagai maklumat dari pelbagai
sumber, mempercepatkan proses kefahaman dan merangsang aras pemikiran tinggi di
kalangan pelajar. Walau bagaimanapun,TMK juga memberi impak negatif seperti
pendedahan pengaruh budaya asing, kebanjiran maklumat yang tidak bermanfaat, dan
mengubah tradisi dan konsep berguru. TMK juga menjadikan proses p&p berorientasikan
pelajar sepenuhnya di mana guru atau pensyarah hanya bertindak sebagai pemudahcara
sahaja.
Berdasarkan kepada penjelasan di atas, TMK mempunyai dua wajah yang berbeza.
Persoalannya ialah adakah TMK itu satu entiti yang mempunyai nilai tertentu (sarat nilai atau
bebas nilai?). Penulis berpandangan bahawa teknologi tidak seperti ilmu atau sains dengan
maksud ia bersifat bebas nilai. Nilai hanya akan muncul apabila ia melibatkan aplikasi
teknologi tersebut. Sekiranya aplikasi dan impaknya bertepatan dengan prinsip shariah,
maka teknologi tersebut adalah baik dan demikianlah sebaliknya. Berdasarkan prinsip yang
dikemukakan oleh Ziauddin Sardar (1990), teknologi akan menjadi sesuatu yang baik dan
harus jika ia mematuhi prinsip-prinsip berikut iaitu tauhid, khilafah, ibadah, halal, adl dan
istislah. Sebaliknya teknologi boleh bertukar menjadi buruk dan fasad jika ia membelakangi
prinsip-prinsip sebelumnya dan bertukar menjadi haram (lawan halal), zulm (lawan adl), dan
dhiya (lawan istihsan). Berdasarkan kefahaman tersebut, TMK hanya perlu melalui proses
kesepaduan ilmu dan bukannya Islamisasi ilmu. Kesepaduan tersebut hanya melibatkan
aplikasi dan impaknya yang perlu bertepatan dengan kerangka pandangan alam Islam (ruyat
al-Islam lil wujud) dan mematuhi prinsip-prinsip umum shariah. Dalam konteks pendidikan,
TMK seharusnya berkhidmat sebagai wasilah untuk mencapai tujuan dan matlamat
pendidikan dan pelaksanaannya tidak harus melanggar prinsip-prinsip dan adab-adab dalam
pendidikan Islam. Dalam konteks ini, adalah lebih strategik sekiranya umat Islam melihat
TMK secara positif tetapi berhati-hati supaya tidak bersalahan dengan prinsip-prinsip shariah.
Bagaimana bentuk kesepaduan tersebut ? Berdasarkan pandangan Tajul Ariffin
(1993) dengan beberapa pengubahsuaian, kesepaduan ilmu dalam TMK boleh dibahagikan
kepada lima tahap. Pertama, aplikasi TMK sebagai pemangkin untuk mempelbetulkan
pandangan masyarakat terhadap konsep Pendidikan Islam yang kini difahami secara sempit.
Kedua, TMK dimanfaatkan untuk membantu proses p&p bagi menyepadukan ilmu naqli /
fardhu ain dengan ilmu aqli / fardhu kifayah. Ketiga, mengguna dan mengeksploitasi TMK
secara positif untuk membina pengajian Islam teras yang tepat dan berkesan di semua
peringkat pendidikan terutama di IPT. Keempat, menguasai TMK untuk mewujudkan suatu
rangkaian pendidikan Islam sedunia dengan membina satu paradigma dan kurikulum
Pendidikan Islam (sebagai satu sistem) yang sama untuk Negara-negara Islam. Kelima,
memanfaatkan TMK untuk membina konsep ketauhidan ilmu-ilmu (kesatuan ilmu) bagi
membina tamadun Islam yang baru. Ini bermakna kesepaduan ilmu dalam TMK memerlukan
umat Islam bertindak bukan lagi sebagai pengguna atau penyewa TMK tetapi pembina atau
pencipta TMK bagi mencapai tujuan yang bertepatan dalam kerangka pandangan alam Islam.
Dalam kerangka yang lebih jauh, kesepaduan ilmu dalam TMK perlu didahului dengan
pembinaan iklim keilmuan dalam bidang sains dan teknologi untuk membina masyarakat
yang mengamalkan budaya dan tradisi saintifik Islam sebagaimana yang telah berlaku suatu
ketika dahulu. Pembentukan budaya tersebut bukan pula didorong oleh kepentingan komersil
dan ekonomi semata-mata tetapi lebih kepada pembangunan akal budi, pemikiran dan
keilmuan serta keperluan masyarakat yang berlandaskan prinsip dharuriyat, hajiyat dan
tahsiniyat. Justeru, TMK hanya bertindak sebagai teknologi atau alat dalam pendidikan dan
bukannya sebagai matlamat pendidikan. TMK sangat berperanan sebagai pemangkin untuk
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 195
merangsang dan mempercepatkan proses kesepaduan ilmu (sebelumnya) dan bukannya
sebagai sebahagian daripada proses kesepaduan ilmu biasa (dalam pengertian pelbagai
bidang ilmu aqli yang juga diakui bermanfaat). Isi kesepaduan ilmu yang sebenar ialah
apabila berlakunya proses kesepaduan di antara ilmu fardhu ain (yang bersifat dinamik)
dengan ilmu fardhu kifayah khususnya ilmu sains moden yang bersifat sarat nilai.
Sebenarnya, kesepaduan ilmu fardhu ain dengan ilmu sains moden tidak mudah untuk
dilaksanakan walaupun dengan menggunakan bantuan TMK.
Langkah-langkah Melaksanakan Proses Kesepaduan Ilmu Dengan Memanfaatkan
TMK
Dengan kefahaman bahawa TMK adalah wasilah yang perlu dimanfaatkan secara optimum
untuk melaksanakan proses kesepaduan ilmu yang sebenar, al-Attas mencadangkan supaya
seseorang itu mestilah terlebih dahulu menguasai ilmu fardhu ain yang bertepatan dengan
peringkat kehidupannya. Perlu difahami bahawa ilmu fardhu itu bersifat dinamik dan sentiasa
berkembang mengikut tahap kerohanian, perkembangan sosial dan profesional serta
tanggungjawab yang dipikul. Dalam konteks KUIS, ilmu fardhu ain tersebut diwakili oleh
sekelompok kursus yang berjumlah 12 jam kredit di mana ia diwajibkan kepada semua
pelajar. Kursus-kursus tersebut terdiri daripada kursus Aqidah dan Akhlak, Fiqh Islami I,
Fiqh Islami II, Fiqh al-Muamalah, Sistem Ekonomi dan Kewangan Islam dan Falsafah Sains
Dan Teknokrat Muslim. Dalam komponen ini, kesepaduan ilmu yang diperlukan ialah
kesepaduan intra. Kesepaduan intra bermaksud kesepaduan antara pelbagai komponen di
dalam kandungan ilmu fardhu ain yang dapat membina kekuatan dalaman, melahirkan
kefahaman tasawwur Islam yang jelas, diikuti dengan amalan yang benar dan seterusnya
menghasilkan peribadi yang bertaqwa. Pada tahap ini, pelajar seharusnya memahami
dengan jelas konsep-konsep penting yang membentuk tasawwur Islam seperti konsep
Tuhan, manusia, ilmu, wahyu, alam, realiti dan kebenaran, serta akhlak dan nilai.
Kesepaduan intra perlu disusuli dengan kesepaduan inter. Kesepaduan inter bermaksud roh
ilmu fardhu ain dihayati secara bersepadu dalam kurikulum bidang pengkhususan.
Kesepaduan akan berlaku apabila seseorang individu mampu meletakkan semua maklumat
yang diperolehi dan ilmu yang dipelajari (bidang pengkhususan) dalam kerangka
epistemologi ilmu yang berpaksikan prinsip tauhid.
Pelaksanaan proses kesepaduan intra dan inter memerlukan rekabentuk instruksi dan
kurikulum yang khusus. Noor Hisham (2008) mencadangkan supaya IPTS yang
berorientasikan kesepaduan seperti KUIS menggunakan rekabentuk pusatan nilai bagi
Kurikulum Fardhu Ain (Kurikulum Pengajian Islam Teras) dan rekabentuk pusatan
pengetahuan bagi Kurikulum Fardhu Kifayah (bidang pengkhususan) di mana kedua-duanya
meletakkan prinsip-prinsip shariah sebagai prinsip penyusunnya. Prinsip-prinsip shariah
tersebut terdiri daripada tiga unsur iaitu konsep, kemahiran dan nilai-nilai asas yang mesti
dikuasai oleh setiap pelajar. Rekabentuk tersebut membantu proses kesepaduan intra dan
inter di mana penyusunan yang dibuat pada aspek kandungan dan aktiviti pengajaran dan
pembelajaran akan membimbing pelajar melihat setiap konsep, kemahiran dan nilai saling
berhubung kait antara satu sama lain secara bermakna. Sebagai contoh pelajar dapat melihat
hubungan yang jelas antara prinsip tauhid (aqidah) dan ibadat zakat (fiqh), nilai sabar
(akhlak) dan konsep sad al-zaraie (usul-fiqh) ; atau fenomena murtad dari perspektif
aqidah, syariah, akhlak, dakwah, perundangan dan lain-lain dalam satu kerangka tasawwur
Islam yang jelas (kesepaduan intra). Demikian juga pelajar akan dibantu untuk melihat
perkaitan di antara ilmu fardhu ain dan fardhu kifayah (bidang pengkhususan) dengan
menjadikan ilmu fardhu ain sebagai paksinya seperti hubungan di antara konsep khilafah
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 196
dengan bidang bioteknologi serta sub-sub kursus di bawahnya. Setiap subjek diterapkan
dengan konsep dan nilai-nilai Islam untuk menunjukkan bahawa semua ilmu saling kait
mengait dan mempunyai matlamat yang sama. Rekabentuk ini dipilih dengan tujuan untuk
memastikan ilmu fardhu kifayah akan dipandu selia oleh prinsip-prinsip dari ilmu fardhu
ain. Ia juga bertujuan supaya proses kesepaduan ini tidak berlaku secara tohor atau tempelan
sahaja. Rekabentuk kurikulum tersebut diharapkan akan dapat membantu proses kesepaduan
ilmu dan Islamisasi ilmu moden dengan menyediakan suasana pengalaman pembelajaran
yang kondusif untuk mengasingkan elemen-elemen asing dan memasukkan konsep-konsep
Islam dalam pelbagai kursus/mata pelajaran. Dengan cara ini, ilmu fardhu kifayah yang tidak
neutral akan sedia untuk diolah semula mengikut epistemologi Islam dan kembali berperanan
untuk melengkapkan kesalingan hierarki ilmu serta membentuk kesepaduan ilmu yang asal.
Di samping itu, pendekatan ini juga akan menjadikan semua pihak khususnya guru dan
pelajar secara automatik menjadi kritis dan kreatif terhadap idea dan isi kandungan buku-
buku teks dari Barat.
Dalam kaitan sebelumnya, TMK memainkan peranan yang sangat penting untuk
merangsang dan mempercepatkan lagi proses kesepaduan tersebut. Melalui TMK,
kemampuan pelajar untuk memahami dan menguasai prinsip-prinsip shariah dapat
ditingkatkan dan seterusnya mengaplikasikannya dalam situasi yang pelbagai. P&p yang
menggunakan TMK secara optimum boleh membantu untuk membuahkan hasil yang
terkandung di dalamnya olahan-olahan baru paduan ilmu warisan Islam dan disiplin ilmu
moden dalam bentuk analisis dan sintesis kreatif. Dengan cara ini, pelajar akan mengalami
sendiri proses kesepaduan ilmu atau Islamisasi ilmu moden dengan bimbingan guru yang
berwibawa. Peranan TMK sangat besar untuk membantu proses p&p supaya pelajar mampu
berfikir dan melihat keseluruhan idea dan aspek kehidupan menurut perspektif Islam.
Kesepaduan IImu Dan TMK Serta Hubungan Dengan Konsep Berguru.
TMK telah menjadikan proses penyampaian ilmu berlaku dengan cepat dan mudah tanpa
perlu hubungan bersemuka antara pelajar dengan guru. Akibatnya, guru kini disaran supaya
berperanan sebagai fasilitator atau pemudahcara bagi membantu pelajar membina skema ilmu
pengetahuannya sendiri. Dengan kata lain, TMK telah mengubah konsep berguru dan
menggantikannya dengan konsep pembelajaran berorientasikan pelajar dalam kerangka baru.
Guru seolah-olah direndahkan tarafnya hanya sebagai penyampai maklumat. Adakah budaya
baru ini bertepatan dengan prinsip dan adab belajar dalam Islam serta membantu proses
kesepaduan ilmu ?
Berdasarkan kepada definisi ilmu dan pendekatan kesepaduan ilmu yang
dikemukakan oleh al-Attas, ilmu memerlukan maklumat yang benar dan memberi makna.
Makna di sini bermaksud ilmu tersebut membawa pemiliknya kepada pengenalan dan
pengakuan tentang kedudukan yang tepat bagi Allah selaku Pemilik dan Pentadbir alam,
kedudukan diri sendiri selaku hamba dan khalifahNya serta kedudukan makhluk Allah yang
lain dengan peranan dan fungsinya yang tersendiri (al-Attas 2001). Ilmu yang benar bukan
sekadar diisi ke dalam akal fikiran tetapi juga dalam hati nurani manusia sehingga ilmu
tersebut dapat dizahirkan dengan amalan praktikal melalui tingkah laku yang beradab dan
berakhlak. Pemahaman terhadap makna memerlukan guru yang berautoriti. Autoriti yang
paling tinggi adalah al-Quran dan Nabi Muhammad. Seterusnya adalah para sahabat, para
ilmuan yang benar-benar mengikuti sunnah Rasulullah s.a.w., memiliki pengetahuan,
kebijaksanaan dan pengalaman spiritual serta selalu mengamalkan agamanya pada tingkatan
ihsan (Wan Mohd Nor 1998). Berdasarkan kepada konsep kesepaduan ilmu yang telah
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 197
dikemukakan, konsep berguru bagi kategori ilmu fardhu ain dan fardhu kifayah perlu
dibezakan. P&p kategori ilmu fardhu ain memerlukan konsep berguru yang tersendiri di
mana pelajar perlu mempelajari konsep, kemahiran dan nilai asas secara langsung dari guru
yang berwibawa. Sebagai contoh, kemahiran membaca dan memahami makna ayat-ayat al-
Quran tidak boleh dipelajari semata-mata menggunakan TMK tanpa bimbingan guru secara
langsung. Ini bermakna bahawa TMK hanya berperanan sebagai alat bantuan untuk
membantu proses p&p dengan lebih efektif dan bukannya menggantikan peranan guru.
Peranan guru sebagai sumber bimbingan kerohanian dan pembentukan akhlak tidak
seharusnya hilang. Namun secara tidak langsung, ia juga bermaksud guru atau pensyarah
ilmu fardhu ain seharusnya melengkapkan diri dengan kemahiran menggunakan malahan jika
mampu membina TMK untuk membantu proses p&p yang menarik dan bermakna.
Dalam konteks p&p yang melibatkan ilmu fardhu kifayah, konsep berguru lebih
fleksibel di mana guru boleh berperanan sebagai fasilitator di samping peranan-peranan
asalnya yang lain. Namun perlu diperingatkan bahawa guru atau pensyarah dalam bidang
berkenaan mempunyai tugas yang berat untuk menyepadukan prinsip-prinsip shariah dengan
bidang ilmu pengkhususan yang dikuasainya. Ini bermakna guru atau pensyarah juga mesti
menguasai ilmu mengenai asas-asas Islam untuk melaksanakan proses kesepaduan tersebut.
Pelajar akan dibimbing supaya melihat perkaitan dan hubungan di antara prinsip-prinsip
shariah dengan bidang pengkhususan secara bermakna. Konsep berguru yang melibatkan
bidang TMK perlu memberi perhatian kepada perkara-perkara berikut untuk melaksanakan
proses kesepaduan ilmu :
1) Pensyarah memahami dan menginsafi konsep hierarki ilmu dan TMK adalah salah satu
cabang ilmu fardhu kifayah yang perlu dikuasai dengan baik.
2) Pelajar yang mengikuti bidang pengkhususan TMK perlu melepasi dan menguasai ilmu
fardhu ain peringkat pengajian tinggi.
3) Dalam proses keilmuan secara maya, perlu wujud juga hubungan bersemuka meskipun
tidak kerap. Seandainya keadaan tidak mengizinkan untuk tujuan itu, taaruf antara guru
dan murid (secara maya) harus berlangsung dalam semangat penuh kejujuran, ikhlas dan
penuh adab.
4) Penuntut ilmu harus bersikap selektif terhadap maklumat di internet. Penuntut ilmu harus
sentiasa memastikan kesahihannya dengan merujuk kepada sumber yang muktabar dan
juga berbincang dengan guru yang berwibawa secara bersemuka.
5) Meskipun penyampaian maklumat secara maya, guru muslim seharusnya memasukkan
nilai-nilai ketauhidan kepada Allah dalam isi pengajarannya.
Penutup
Kesepaduan ilmu memerlukan jaringan kerjasama semua pihak bermula dengan pembinaan
sistem pendidikan yang betul, rekabentuk kurikulum yang tepat, pensyarah yang berwibawa,
prasarana yang baik, persekitaran yang kondusif dan pelajar yang ikhlas dan bersemangat.
TMK memainkan peranan yang sangat penting sebagai alat untuk membantu proses tersebut
dari pelbagai sudut khususnya dari dimensi kepantasan, kedekatan ruang dan penjimatan
perbelanjaan. Pun begitu aspek-aspek negatif perlu juga dipantau dengan cermat.
Ringkasnya kesepaduan ilmu menatijahkan bahawa pelajar akhirnya akan menemui
kebesaran Allah (dalam bentuk yang luas dan pelbagai) dan kemudian tunduk serta taat
kepadaNya.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 198
RUJUKAN
Abdul Rahman Abdullah. ( 2005). Wacana falsafah ilmu. Kuala Lumpur: Utusan
Publications & Distributors Sdn. Bhd.
al-Attas, Syed Muhammad Naquib. (1978). Islam and secularism. Kuala Lumpur : Muslim
Youth Movement of Malaysia (ABIM).
al-Attas, Syed Muhammad Naquib. (1979). Aims and objective of Islamic education. Jeddah:
King Abdul Azis University.
al-Attas, Syed Muhammad Naquib. (2001). Prolegomena to the metaphysics of Islam. Kuala
Lumpur: Institut Antarabangsa Pemikiran dan Tamadun Islam (ISTAC).
Baiquni, A. (1983). Islam dan ilmu pengetahuan moden. Bandung : Penerbit Pustaka.
Barbour,I .(2001). Dlm Hester, D. M and Ford, P. J. (2001). Computers and ethics in the
cyberspace. New Jersey : Prentice Hall.
Drake, S.M. (1991). How our team dissolved the boundaries. Educational leadership, 49(2),
20-22.
Fuller, S. (1988). Social epistemologi. Bloomington : Indiana University Press.
Rosenthal, F. (1997). Keagungan ilmu. Terj. Syed Muhammad Dawilah Syed Abdullah.
Kuala Lumpur : Dewan Bahasa dan Pustaka.
Haught, J.F. (1995). Science and religion : from conflict to conversation. New York : Paulist
Press.
Ingram, J.B. (1979). Curriculum integration and lifelong education. Oxford: Pergamon Press.
Martin et al. (1994). Dlm Abdul Razak et al. (2000). Teknologi maklumat. Kuala Lumpur :
Mc Graw Hill.
McNeil, J.D. (1996). Curriculum ; a comprehensive introduction. Ed. ke-5. New York:
Harper Collin College Publishers.
Mohd Nasir Omar. (2001). Gagasan Islamisasi ilmu: suatu telahan tentang signifikasi,
konsep dan metodologi. Pemikir 26: 67-103
Musa Abu Hasaan (2002). Peranan dan penggguna ICT di kalangan masyarakat. Serdang :
Universiti Putra Malaysia.
Noor Hisham Md Nawi. (2008). Pembinaan garis panduan bagi pembentukan Kurikulum
Teras Fardhu Ain di IPTS. Tesis Ph.D. Universiti Kebangsaan Malaysia
Osman Bakar. (1992). Classification of knowledge in Islam. Kuala Lumpur: Institute of
Policy Research.
Robert, L.P & Kellough, R.D. (2000). A guide for developing interdisciplinary thematic unit.
Ed. ke-2. USA: Prentice Hall.
Syed Ali Ashraf. (1981). Islamic curricula for muslim education. Islamic Education
Quarterly 1(1): 61-82.
Syed Azad Syed Attar. (1998). Gagasan Islamisasi ilmu dan implikasinya kepada falsafah dan
sistem pendidikan negara. Tesis Sarjana Pendidikan. Universiti Malaya.
Tajul Ariffin Noordin. (1993).Penggunaan teknologi canggih dalam Pendidikan Islam pada
abad ke 21. Kertas kerja Seminar Islam Dan Cabaran Abad 21. ITM Shah Alam.
Wan Mohd Nor Wan Daud. (1994). Konsep ilmu dalam Islam. Terj. Rosnani Hashim. Kuala
Lumpur: Dewan Bahasa dan Pustaka.
Wan Mohd Nor Wan Daud. (1998). The educational philosophy and practice of Syed
Muhammad Naquib Al-Atass; an exposition of the original concept of Islamization.
Kuala Lumpur: ISTAC.
Yasin, Mohammed. (1993). Islamization of knowledge: a comparative analysis of Faruqi and
Rahman. Muslim Education Quarterly 11(1): 27-40.
Ziauddin, Sardar. (1990). Masa hadapan Islam. Bentuk idea yang akan datang. Terj. Mohd
Sidin Ahmad Sahak. Kuala Lumpur: Dewan Bahasa dan Pustaka.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 199
DEVELOPMENT OF RESEARCH FRAMEWORK FOR ASSESSMENT
TECHNIQUE IN PROBLEM BASED LEARNING (PBL) APPROACH
Che Ku Nuraini Che Ku Mohd, Faaizah Shahbodin
Department of Interactive Media,
Faculty of Information and Communication Technology,
Universiti Teknikal Malaysia Melaka,
niniey_mohd@yahoo.com, faaizah@utem.edu.my
ABSTRACT
The purpose of this paper is to highlight the preliminary design of assessment technique in
Problem Based Learning (PBL) for teaching Human Computer Interaction (HCI) subject. It
focuses on assessment technique in PBL which will be described in this paper. The process of
designing assessment technique involved of three phases. Phase one includes literature survey
and collection of preliminary analysis data. Second phase is Designing and Development
which adopt ADDIE model as a basis for multimedia development. The last phase is Testing
and Evaluation. This is the phase to evaluate whether assessment technique is effective and
satisfies the course objectives. This phase evaluate feedback from selected respondents.
Evaluation is done constantly both during development and delivery. There are four research
instruments gathered to evaluate the project which are questionnaire, interview, observation
and the development of prototype. A pre and post test questionnaire will be distributed to the
students before and after the exposure respectively.
Keywords: Assessment Technique, ADDIE, Problem Based Learning (PBL), Instructional
Method
1. Introduction
Problem Based Learning (PBL) is a pedagogical strategy for posing significant,
contextualized, real world situations, and providing resources, guidance, and instruction to
learners as they develop content knowledge and problem-solving skills (Mayo et al, 2000).
PBL also encourages collaborative and cooperative learning among students and their peers;
students play the key role in encouraging learning in this collaborative setting (Neo, 2003).
Below is the comparison between traditional learning and PBL.
Table 1: Comparison between Traditional Learning and Problem-Based Learning
Traditional Learning Problem-Based Learning
Teacher centered Student centered
Linear and rational Coherent and relevant
Teacher as transmitter Instructor as facilitator or collaborator
Students as passive receivers Students as constructors. Active participants
Structured environment Flexible environment
Individual and competitive learning Co-operative learning
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 200
Assessment is the responsibility of the
teacher
Assessment is the shared responsibility of
the students, the group and the teacher
(Source: M. Garca-Famoso, 2005 Recent Research Developments in Learning Technologies)
The research is conducted to produce a courseware to teach Human Computer Interaction
(HCI) subject by applying the PBL approach which is focusing on assessment technique.
Three types of assessment techniques are highlighted in PBL. There are self, peer and group
assessment. The main purpose of assessment technique is to indicate that the PBL method
significantly improves important skills such as problem solving, real-world problems,
finding, evaluating, and using appropriate learning resources.
The HCI subject is chosen because it is a compulsory subject for computer science students
in Media Interactive course. Specifically HCI is concerned developing new interfaces and
interaction techniques. Students prefer to memorize the facts and theories and practically they
failed to integrate the elements effectively (based on from preliminary result). The learning
resources that provided can emphasizes the users to contribute actively share their designs,
ideas and discussion through an online forum.
2. Research Framework
A research framework tells researcher what they have to do, to manage the projects from start
to finish. It describes every step in the project life cycle in depth, so we can know exactly
which tasks to complete, when and how. Diagram below shows the research framework of
this project.
Figure 1: Research Framework
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 201
2.1 Control Modes
There are three components that consist in this research framework which is 1) Control
Modes, 2) Content and 3) Output. It consist three independent variables. There are self, peer
assessment and group assessment. Self-assessment is a process by which person learn more
about himself and herself, what he or she likes, what don't like, and how he and she tend to
react to certain situations. It gives people the choice to assess their own needs or carry out an
assessment on behalf of someone else.
Peer assessment means the students work in pair. The students comment on and judge their
colleagues work. It encourages students thinking skills. Peer assessment can help self
assessment. Peer assessment is assessment on students by other students which provide
formative and summative feedback. The students comment on and judge their colleagues
work. It encourages students thinking skills. Peer assessment can help self assessment
(Baker, D. F, 2008).
Group assessment can provide students with opportunities to develop skills and qualities.
There are three to five people in each group. The most important single issue is often the
tricky matter of establishing the levels of contribution of respective team members (Race et
al., 2005). PBL involves a great deal of team or group work and a large amount of the
assessment should revolve around this type of activity.
2.2 Content
In the part of content, myAssess is developed based on ADDIE model. Figure below shows
the flow of ADDIE model.
Figure 2: ADDIE Model
Source: Gordon dan Zemke (2000)
The ADDIE is an instructional design model that can be applied to any kind of learning
solution. The solution of the problem is analyzed thoroughly to ensure that the solution
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 202
impacts performance in a positive way. The five phases are consisting of Analysis, Design,
Development, Implementation, and Evaluation.
Analysis also considers the learning environment, any constraints, the delivery options, and
the timeline for the project. In design phase, a systematic process of specifying learning
objectives is determined. Detailed storyboards and prototypes are often made, and the look
and feel, graphic design, user-interface and content are determined here. Development phase
is the actual creation or production of the content and learning materials based on the design
phase. During implementation, the plan is put into action and a procedure for training the
learner and teacher is developed. Materials are delivered or distributed to the student group.
After delivery, the effectiveness of the training materials is evaluated. The evaluation phase
consists of (1) formative and (2) summative evaluation. Formative evaluation is present in
each stage of the ADDIE process. Summative evaluation consists of tests designed for
criterion-related referenced items and providing opportunities for feedback from the users.
2.3 Output
Last part is the output of research. Figure below shows the testing procedure for this research.
Figure 3: Testing Procedure
Testing is conducted to test the effectiveness of the courseware is based on pre and post test
score from two groups of students for User Interface topic. The pre test data is gathered from
control group which are using non-PBL paper based while the post test data is gathered from
experimental group which are using the PBL courseware. Then the score is compared to see
the increment of value. After that the data is analyzed. If there is error, the project
improvement will be made.
3. Expected Outcome
The expected outcome is PBL courseware which is applying assessment technique to see its
suitability in delivery a technical courses among students. The assessment may lead to the
effectiveness in learning. It is also hoped that the application can play significant role to
motivate learners as well as improve their thinking and problem solving skills.
4. Conclusion
This paper has been discussed is research framework of assessment technique in PBL.
Questionnaire, interview and observation are conducted in this research. Many
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 203
recommendations from the higher education literature on optimal implementation of peer
assessment procedures were put into practice. In the future it hopes that the development of
PBL might be incorporate different dimensions especially in assessment part.
5. Acknowledgement
Sincere thanks to all the people who have contributed to and worked on this research project.
I would like to thank all those lecturers and colleagues who have given me their support and
help.
References
Baker, D. F. (2008). Peer assessment in small groups: A comparison of methods. Journal of
Management Education, 32 (2), 183-209.
Gordon, J., & Zemke, R. (2000, April). The Attack on ISD. Training, 43-53.
Available:http://www.trainingsupersite.com/publications/archive/training/2000/004/004
cv.htm
Lau Eng Hong, Foo Kok Keong, Hanafi Atan, Omar Majid & Zuraidah Abd Rahman (2009).
The Learner Control Feature in Multimedia Learning Courseware towards Learners
with Different Cognitive Styles: A Proposed Research Framework. 3rd International
Malaysian Educational Technology Convention.
Mayo, W. P., M. B. Donnelly, et al. (2000). Characteristics of the ideal problem-based
learning tutor in clinical medicine. Evaluation and the Health Professions 18(2): 124-
136.
M. Garca-Famoso (2005). Problem-based learning: a case study in computer science.
Recent Research Developments in Learning Technologies.
Neo. T. K. (2003). Using multimedia in a constructivist learning environment in the
Malaysian classroom. Australian Journal of Educational Technology 19(3), 293-310.
Race, P., Brown, S., and Smith, B. (2005). 500 tips on assessment. London: Routledge
Falmer, second edition.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 204
DEVELOPMENT OF RESEARCH FRAMEWORK FOR PBL PROBLEM
SCENARIO USING LINEAR & NON-LINEAR MULTIMEDIA
W Nurnadiah. W Mohd Puzi
1
, Faaizah. Shahbodin
2
, Burairah. Hussin
3
Department of Interactive Media,
Faculty of Information and Communication Technology,
Universiti Teknikal Malaysia Melaka,
na_twee@yahoo.com
1
, faaizah@utem.edu.my
2
, burairah@utem.edu.my
3
Abstract
Problem Based Learning (PBL) is an instructional approach to provide student with
knowledge suitable for problem solving. To support the research, PBLStat courseware is
developed based on the PBL approach. In PBL approach, problem scenario is first presented
during the learning process. Problem scenario helps to maintain student interest in course so
it is important to create a good problem that can cause students inquiry and drive students to
solve the problems. The purpose of this paper is to highlight the development of research
framework for PBL problem scenario presentation. Problem scenario can be presented using
linear and non-linear multimedia categories. The framework of study contains the description
of research control modes, content and output. The control modes of the research are
consisting of two independent variables which are linear problem scenario and non-linear
problem scenario. Content is the phase of coursewares development. The ADDIE model is
used to complete the development of courseware. Finally is the research output, this is to
evaluate students preferences and performances based on the problem scenario
categorization. There are four research instrument tools has been created to answer the
research question which are questionnaire, observation, interview and PBLStat.
Keywords: Problem Scenario, Problem Based Learning, Linear and Non-Linear
1. Introduction
Developments in Information Communication Technologies (ICT) have been rapid in recent
years and have influenced education field. As the move towards, ICT has been used in
learning approaches to improve the quality of education. There are a few examples of
learning method and approaches such as Collaborative Learning, Cooperative Learning,
Discovery Learning, Discovery Based Learning, Engaged Learning, Problem Based Learning
and Whole Language Approach. This study focuses on one of the approach which is Problem
Based Learning (PBL). Problem Based Learning (PBL) is an instructional approach that is
said to provide student with knowledge suitable for problem solving. One of the main
defining characteristic of PBL, which distinguishes it from some other approach, is that the
problem is presented to the students first at the start learning process, before other curriculum
inputs (Barrett T., 2005).
We believe that it is important to design a proper problem scenario to encourage students on
how to understand and solve the problem. Hence, developing a presentable problem scenario
is important for the full benefits of PBL to be realized (Lynda Wee KN et. al, 2001).
Multimedia is comprised of several elements including text, graphic, sound, video and
animation. Audio, video and animation are integrated with instruction in order to create a
more interesting, supportive and learning-conducive environment (Eng Hong L. et al, 2009).
All of these multimedia elements can be divided into two categories which is linear and non-
linear.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 205
2. Research Framework
Research framework can be defined as research activities that used to produce specific
activities. The research framework for this study is referred and guided by Eng Hong L. et al
(2009) research framework. The framework contains the description of research control
modes, content and output. Control modes of the research consist of two independent
variables which are linear problem scenario and non-linear problem scenario. The content is
the development of courseware. Then, the research output is to measure students preferences
and performances based on the problem scenario categorization. The following figure shows
the research framework for this project:
Figure 1: Research Framework
2.1. Control Modes
PBL problem scenario is designed into two categorization of multimedia to evaluate the
effectiveness among students. This is the control modes for this research. The two variables
that measured are linear technique and non-linear technique. In linear problem scenario
presentation, learners do not have to control over problem scenario. Non linear PBL problem
scenario is interactive multimedia presentations which require input and interaction from the
user. In non-linear problem scenario presentation, learner control over sequence of problem
scenario instruction.
Figure 2: Categories of Problem Scenario
Problem Scenario
Linear Non-Linear
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 206
2.2. Content Development
Content is the structuring process to develop PBLStat which is a research tools to measure
hypothesis. To support the research, PBLStat courseware is developed based on the PBL
approach. For this stage, the ADDIE methodology is used because PBLStat is a multimedia
instructional courseware. This model is very flexible for building multimedia courseware and
is widely used. The ADDIE model stands for five sequence states of the instructional design:
Analysis, Design, Development, Implementation, and Evaluation.
Figure 3: Adapted from ADDIE model
Design
Design PBLStat
Interface
Development
Develop the PBLStat
using Adobe Flash CS3
Implementation
Integrates into final
product
Interactivity and
Navigation
Analysis
Project Requirement
User Requirement
Hardware & Software
Requirement
Functional & Non-
Functional Requirement
Evaluation
Interface Design
Accessibility
Content Design
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 207
2.3 Output
Output is the stage to test the project and make an improvement based on the objectives.
After finishing the development stage, the research will evaluate to know the result of
hypothesis. This phase is when the developer test for the success of the learning objects in
helping the learners to attain the appropriate concepts. It is important to know the objectives
of the project are achieved or not. This study measures the instructional outcomes of
students preferences and students performances. Questionnaire and PBLStat have been used
as research instrument tools to measure these outcomes. The following figures show the
output and testing procedure for the research question.
Figure 4: Output
There are three research question need to be measure and this paper discuss two of research
question. One of the research questions is Is there any difference in terms of students
performances in linear and non-linear problem scenario presentation? In order to answer this
research question the testing procedure has been design as figure below:
Figure 5: Testing Procedure
The next research question is Is there any relationship between students performances and
preferences? Figure below show the testing procedure to answer this research question.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 208
Figure 6: Testing Procedure
3. Conclusion
Every part of the stage in research framework and methodology that involves is important to
complete the study. In Control Modes, learner is allowed to select the problem scenario
technique and choose the part that interested. In Content, consists of ADDIE model to
complete the PBLStat which is one of instrument tool to measure objective of project. Then
in Output, which is the instructional outcomes that to test the project objective. A systematic
research framework is used to investigate the effectiveness of problem scenario presentation
between linear and non-linear techniques. It is important to clear and complete the phase in
this research framework to achieve the project goal.
References
Barrett T., Understanding Problem Based Learning, 2005.
Lynda Wee KN, et.al, Crafting Effective Problems For Problem Based Learning. Problem
Based Learning Conference, 2001.
Eng Hong L. et.al, The Leaner Control Feature in Multimedia Learning Courseware
Towards Learners with Different Cognitive Styles: A Proposed Research
Framework. Third International Malaysian Educational Technology Convention,
2009.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 209
E-PEMBELAJARAN: EVOLUSI INTERNET DALAM
PEMBELAJARAN SEPANJANG HAYAT
Zahiah Binti Kassim & Abdul Razaq Bin Ahmad
Universiti Kebangsaan Malaysia
zahiahkassim@yahoo.com
Abstrak
Globalisasi membawa perubahan teknologi kepada masyarakat. Ledakan maklumat dan
keupayaan hebat teknologi terutamanya kuasa digital dan pengkomputeran telah mencabar
sistem pendidikan termasuk teori pembelajaran untuk turut berubah. Kini konsep ruang siber
dan universiti maya menyediakan persekitaran pembelajaran secara jarak jauh atau atas talian
(online) melalui World Wide Web (WWW) dengan bantuan alat teknologi maklumat dan
komunikasi. Alatan ini merupakan simulasi yang membolehkan pelajar mengalami
pengalaman pembelajaran sebenar dan dapat berinteraksi dengan individu lain tanpa perlu
bersemuka. Kemudahan ini menjadi agen sosialisasi terbaik yang menuntut individu sentiasa
mengemaskini ilmu, pengetahuan dan kemahiran di sepanjang hayat mereka. Namun kajian
mendapati ia masih lagi mempunyai isu dan cabaran yang perlu ditangani dengan bijak.
Kertas konsep ini meneroka peranan dan cabaran e-pembelajaran menerusi internet terhadap
pembelajaran sepanjang hayat orang dewasa.
Abstract
Globalisation brings technological changes to people. The huge amount of information and
the power of technology especially the digital power and computerisation have threatened
the education system including the educational theories to go along with the changes. Now
the concepts of cyberspace and virtual university provide distance learning environment or
online learning via World Wide Web (WWW) empowerd by information and communication
technology. These tools are helpful simulations which enable students to feel the real
learning experience dan enable them to interact with each other virtually. These facilities
have became the best socialisation agents which require students to update their knowledge
dan skills through a lifelong learning. But several research findings showed that there are
issues and challenges that need to be handled intelligently. This concept paper is to explore
the role and challenges of e-learning via the internet on the lifelong learning especially to
adult education.
GLOBALISASI, TEKNOLOGI DAN
PEMBELAJARAN SEPANJANG HAYAT:
Pengenalan:
Kepimpinan negara menekankan pentingnya modal insan kelas dunia untuk meningkatkan daya
saing negara dalam era global berteraskan ilmu pengetahuan. Dua ciri utama ekonomi berteraskan
ilmu yang sedang berlaku di seluruh dunia adalah tentang pantasnya aplikasi ilmu dan evolusi
teknologi komunikasi yang secara signifikan mengubah masyarakat moden. Kini, revolusi
transmisi maklumat membentuk masyarakat digital dan nettizen (net citizen) yang semakin pantas
dan lebih dekat, yang hidup dalam ledakan maklumat, berinteraksi tanpa batas geografi fizikal
dan tiada had ruang masa. Komunikasi berasaskan komputer bukan hanya memperhebatkan
revolusi maklumat, malah potensi teknologi itu sendiri berkembang menjadi lebih canggih untuk
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 210
menyedia, mencipta, mengumpul, memproses dan menyebarkan maklumat serta pengetahuan.
Justeru, pada abad ke 21 ini, teknologi internet dan World Wide Web (WWW) memainkan peranan
utama sebagai agen komunikasi, interaksi, pendidikan dan sosialisasi masyarakat dunia.
Sesebuah negara yang mahu terus berjaya dalam ekonomi berteraskan ilmu, harus
menyediakan peluang pembelajaran sepanjang hayat kepada modal insannya sehingga menjadi satu
budaya hidup. Pencarian ilmu yang berterusan adalah penting kerana ilmu dan kemahiran yang
diperolehi di sekolah dan universiti akan menjadi lapuk selepas satu tempoh yang tertentu.
Terutamanya, kini aktiviti ekonomi telah berubah kepada berasaskan pengetahuan atau di panggil
k-economy. K-economy memerlukan k-pekerja kerana pendekatan aktiviti ekonomi yang
menggunakan ilmu pengetahuan, modal intelek dan teknologi maklumat. E-pembelajaran
merupakan asas kepada ekonomi bermaklumat dan ekonomi berpengetahuan (k-economy).
Penggunaan jaringan teknologi terutamanya internet adalah satu evolusi yang menjana kekayaan
maklumat dalam pembelajaran dengan kuasa membawa maklumat dan kemahiran tertentu untuk
mengupaya pekerja, pelajar dan setiap individu yang benar-benar memerlukannya.
E-PEMBELAJARAN: EVOLUSI INTERNET
Sejarah telah membuktikan bahawa perindustrian dan perkembangan teknologi mampu mengubah
sesebuah masyarakat. Perkembangan teknologi terutamanya evolusi internet telah mencabar
konsep dan teori pendidikan tradisional, terutamanya terhadap konsep bilik darjah serta metod
pengajaran dan pembelajaran (Hunt, 2004; Resnick dan Wirth, 1996.)
Pembelajaran berbantukan komputer telah mencipta universiti maya yang semakin popular pada
masa kini. Universiti maya menyediakan modul-modul kursus serta komunikasi interpersonal yang
hanya memerlukan pelajar mempunyai kebolehan pembelajaran arahan kendiri, serta kemudahan
komunikasi sinkroni dan asinkroni sebagai syarat asas.
Salah satu kaedah pendidikan sepanjang hayat ialah pendidikan secara jarak jauh (PJJ) yang
diupayakan oleh jaringan elektronik dan konsep elektronik pembelajaran (pembelajaran melalui
elektronik) atau e-pembelajaran. E-pembelajaran juga dikenali sebagai m-pembelajaran atau
mobile learning. Kemudahan pengurusan maklumat membolehkan individu belajar dalam
pelbagai pengalaman pembelajaran menerusi internet. Ia boleh dilakukan dalam dua cara iaitu
dalam ruang kerja peribadi dan ruang kerja kolaboratif yang memerlukan pelajar bertukar
maklumat secara sinkroni (synchronous) atau asinkroni (asynchronous) dalam global village yang
dibina oleh laman-laman sesawang (web) sehingga membolehkan sesiapa sahaja dihubungkan.
E-pembelajaran bermula dengan kebolehan mengakses laman-laman sesawang di internet
yang menjadi akses kepada pelbagai sumber e-pembelajaran, termasuklah laman-laman capaian
maklumat, program dan pelbagai pilihan pembelajaran berasaskan hipermedia yang menggunakan
atribut dan sumber dari laman web WWW supaya berlaku suasana pembelajaran yang sebenar
(Rozinah 2007; Rosenberg 2001; Talesra et al 2003, Smith dan Ragan 1993). E-pembelajaran
boleh berlaku samada secara formal iaitu dengan mengikuti program khas yang dikendalikan oleh
pihak institusi dan universiti secara maya atau pun merupakan sumber pengurusan maklumat
secara tidak formal sebagai lokasi perbincangan maya. Maka, PBW memberi peluang kepada
orang dewasa meneruskan pembelajaran sepanjang hayat secara jarak jauh. Infrastruktur e-
pembelajaran secara asasnya memerlukan item-item berikut:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 211
OBJEK PEMBELAJARAN
Kandungan: data/maklumat, proses, dokumen,alat
Sumber: arkib,internet, intranet
Format: video, grafik, teks, audio
(sumber: Rosenberg 2001)
Rajah 1: Kerangka Infrastruktur Proses E-pembelajaran
Teori E-pembelajaran (e-learning) dan Teori Andragogi
Teori e-pembelajaran berpendapat bahawa pelajar dapat mengawal pembelajaran mereka
dengan lebih baik melalui peluang pembelajaran secara kolaboratif, interaktif dan persendirian
kerana media elektronik menyediakan persekitaran pembelajaran berdasarkan prinsip just-in-
time dengan kompetensi anywhere, anytime, anyone (Talesra et al. 2003, Karoulis et al, 2004).
Konsep ini sangat sesuai dengan teori andragogi iaitu orang dewasa belajar dengan motivasi
kendiri mengikut kesesuaian peribadi (Knowles et al . 2005; Mazanah, 2001 ; Merriam &
Caffarella., 1999;
Baddeley dan Hitch pada tahun 1974 telah mengemukakan teori working memory yang
menyatakan bahawa pembelajaran melalui multimedia menyebabkan otak berfungsi secara
langsung mengenkod dua jenis maklumat iaitu stimulasi audio dan stimulasi visual. Kajian
psikologi membuktikan bahawa maklumat verbal akan lebih mudah diingati jika disertai dengan
imej visual. Teori tersebut kemudiannya di aplikasikan oleh Richard Mayer yang memperkenalkan
teori dua koding multimedia, menurut teori ini pelajar lebih mudah memindahkan pembelajaran
mereka melalui arahan multimedia yang memberi kesan kepada kognitif (Cognitive Theory of
Multimedia Learning).
Teori pembelajaran dewasa boleh disesuaikan dengan metodologi e-pembelajaran ini.
Apabila teori ini diintegrasikan dalam persekitaran pembelajaran, ia mampu mencipta pelajaran
atau program kursus yang sesuai dengan teknologi terkini dan pada masa sama berfokus kepada
kehendak dan keperluan orang dewasa supaya mereka dapat meneruskan pembelajaran di
sepanjang hayat mereka.
Rekabentuk
instruksional &
maklumat
Portal
pembelajaran:
Asinkronasi dan
sinkronasi
Latihan online,
Pengurusan pengetahuan,
Proses bimbingan,
Polisi & garispanduan,
Bantuan prestasi,
Bantuan kerja/belajar
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 212
Pengaplikasian online dan laman web telah memulakan evolusi komunikasi jarak jauh yang
memberi peluang pembelajaran dilaksanakan secara kolaboratif dan kerja projek dari pelbagai
lokasi. Evolusi ini bukan sahaja mampu membentuk masyarakat bermaklumat, malah memberi
peluang kepada orang dewasa untuk meningkatkan kemahiran sepanjang hayat, dalam dua elemen
iaitu elemen pembelajaran kendiri (self study) menerusi penggunaan, pengurusan maklumat
berasaskan media seperti bahan kursus (courseware) dan mencipta entiti pembelajaran melalui
pelayaran capaian maklumat dengan bantuan media maklumat elektronik.
Pembelajaran interaktif berperanan meningkatkan pembelajaran pelajar melalui
pengalaman melakukan eksplorasi kendiri mengikut pelbagai pendekatan pengajaran dan
pembelajaran, dan penemuan baru semasa proses penyelesaian masalah. Oleh kerana nota
pengajaran syarahan dan tutorial dapat disampaikan secara komunikasi asinkroni dan sinkroni,
maka media komunikasi telah mengubah caragaya pelajar dan guru (tutor) melakukan kajian,
membaca dan menulis. Kini, terdapat pelbagai kaedah kajian, pembacaan dan penulisan yang
melibatkan konsep-konsep seperti hiperteks, dan penulisan kolaboratif. Dalam pembelajaran
dewasa, teknologi diintergrasikan sebagai kaedah untuk penyampaian pengetahuan dan arahan
tugas sehingga membolehkan orang dewasa mempunyai privasi untuk membuat latihan disamping
dapat memperkembangkan konsep pembelajaran arahan kendiri yang dapat disesuaikan dengan
mod individu.
Tekonologi juga mengubah generasi dan bentuk hubungan sosial (Talesra et al 2003;),
apabila program software dipertingkatkan, sebenarnya ia meningkatkan interaktiviti, meningkatkan
komunikasi, meningkatkan kebolehan adaptasi, menambah perkongsian dan meningkatkan
pengalaman pembelajaran (Zoraini Wati, 2008; Robertson, 1992). Maka, teknologi mencipta
masyarakat dunia baru yang saling berinteraksi dan berkuasa bukan hanya sebagai alat
perhubungan malah menjadi alat pendidikan. Disamping itu, perkongsian meluas dapat
menggalakkan individu termasuk ahli akademik berkongsi kurikulum dan sumber di serata dunia.
PEMBELAJARAN SEPANJANG HAYAT (PSH)
Pengenalan:
Pembelajaran sepanjang hayat adalah proses memperkayakan modal intelek yang semakin menjadi
sebahagian daripada cara hidup. Ia boleh dilakukan dalam pelbagai konteks, pelbagai situasi dan
untuk semua orang pada semua peringkat umur atau tempoh hayat. PSH juga dikenali sebagai
pembelajaran terbuka yang memberi masyarakat satu kapasiti untuk belajar dan terus belajar
terutamanya berdasarkan arahan kendiri (Hargreaves,. 2004; Aspin et al, 2001; Gelpi, E. 1995)
Idea tentang pembelajaran sepanjang hayat ini telah diperkenalkan oleh UNESCO lebih 30
tahun yang lalu. Idea asalnya dikaitkan dengan harapan membentuk masyarakat yang mempunyai
kualiti kehidupan yang lebih tinggi. Namun begitu, pada generasi kedua, idea tersebut mula
berkembang sebagai satu usaha memenuhi keperluan tenaga buruh berkemahiran dan
berkompetensi. Iaitu pembelajaran sepanjang hayat dikaitkan dengan elemen teori modal ekonomi
manusia (Toth, 2002).
Akhirnya, ia menjadi satu pendekatan berintegrasi dengan progam yang lebih konkrit telah
diimplementasikan pada tahun 2001. Pendekatan berintegrasi ini terhasil dari satu persidangan
negara-negara Eropah iaitu The Lisbon European Council pada Mac 2000. Komisyen persidangan
tersebut telah mengeluarkan memorandum A Memorandum of Lifelong Learning yang
mendefinisikan pembelajaran sepanjang hayat sebagai semua aktiviti pembelajaran yang
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 213
dilaksanakan sepanjang kehidupan dengan tujuan untuk meningkatkan pengetahuan, kemahiran
dan kompetensi dalam perspektif peribadi, sivik, sosial dan/atau pekerjaan.
all learning activity undertaken throughout life, with the aim of improving
knowledge, skills and competences within a personal, civic, social and/or
employmen-related perspective
(A Memorandum of Lifelong Learning)
Definisi dan Konsep Pendidikan Sepanjang Hayat:
Pembelajaran sepanjang hayat ialah pencarian ilmu pengetahuan untuk peribadi atau profesional
yang dilakukan sepanjang masa, sukarela dan atas motivasi kendiri. Ia juga pembangunan potensi
manusia melalui proses pembelajaran berterusan yang memotivasi dan mengupayakan individu
menguasai ilmu, menghayati nilai murni yang diperlukan sepanjang hayat dan meluasi pengalaman
hidup supaya individu mengambil tanggungjawab dalam berbagai peranan dan keadaan dengan
yakin serta kreatif menghadapi segala cabaran hidup (Ibrahim Ahmad Bajunid 2006; Hargreaves,.
2004; Aspin et al,2001; Gelpi, E. 1995). Ini bermakna seseorang akan menghadapi perubahan
dalam peringkat kehidupan, maka keperluan belajar menjadi penting, tetapi jenis maklumat, ilmu
dan fokusnya adalah berbeza pada setiap peringkat. Selain itu, ia selari dengan kehendak sosial
dan ekonomi sezaman, yang memaksa individu menjadi aktif untuk kebaikan diri sendiri. Ini telah
menyedarkan masyarakat terutamanya golongan dewasa bahawa pendidikan formal yang
diperolehi semasa muda tidak lagi sesuai di sepanjang hayat mereka (Hargreaves,. 2004; Aspin et
al,2001; Gelpi, E. 1995; Long,1990).
Terdapat beberapa konteks dan konsep pembelajaran sepanjang hayat iaitu: home schooling
yang melibatkan pembelajaran tidak formal di rumah; pendidikan dewasa iaitu usaha pembelajaran
formal dan berstruktur untuk mendapatkan sijil atau kelayakan dan kemahiran kerja untuk
kehidupan seterusnya; menyambung pelajaran adalah progam pembelajaran formal dan berstruktur
iaitu usaha meneruskan pengajian atau menghadiri kursus anjuran institusi pendidikan tinggi;
latihan dalam perkhidmatan (on-the-job training) meliputi perkembangan profesional dan latihan
kerja, samada dilakukan atas usaha peribadi atau anjuran organisasi; Pembelajaran maya (online
learning) adalah persekitaran pembelajaran peribadi atau pembelajaran arahan kendiri samada
secara formal atau tidak formal melalui pelbagai sumber dan alat multimedia secara atas talian
(online).
Model Pembelajaran Sepanjang Hayat
Pendidikan jarak jauh telah lama wujud di kebanyakan negara dan telah dianggap sebagai
suatu model pendidikan yang dapat memajukan dasar PSH. Ciri utama PSH ialah fleksibiliti
program yang membolehkan pembelajaran berlaku pada masa dan tempat yang sesuai dengan
pelajar. Ciri-ciri pelajar juga telah berubah dari segi umur yang semakin meningkat dan kini
terdapat pelbagai mod cara belajar tanpa batasan masa dan tempat. Antara kumpulan sasaran utama
PSH ialah golongan dewasa yang bekerja, suri rumah dan warga emas yang mahu memberikan
sumbangan kepada negara, menambah baik diri dan mempelbagaikan kemahiran .
Penggunaan format media terkini seperti fail MP3 dan MP4 telah membolehkan bahan
tutorial dimuatturun dalam bentuk video, audio, imejan dan slaid digital. Selain itu, kaedah
pembelajaran ini tidak mendatangkan masalah kerana bahan pembelajaran adalah direka dengan
arahan kendiri (self-instructional), interaktif, mesra-pelajar (leaner friendly) dan sistematik
(Zoraini Wati, 2008; Rozinah 2007; Rosenberg 2001; Talesra et al 2003) . Sehubungan itu, Zoraini
Wati (2008) telah mengemukakan satu teori pembelajaran global yang dibentuk oleh Siemen
(2005). Menurut teori tersebut, pada masa akan datang, sistem pendidikan akan menggunakan alat
perhubungan online sosial seperti laman web, blog, wikipedia dan ruang sosial seperti My Space
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 214
dan Facebook. Ini bermakna pembelajaran masa kini dan akan datang adalah satu proses aktif di
antara bahan pembelajaran, interaksi sosial dan kompetensi teknologi.
Berikut adalah model pembelajaran sepanjang hayat yang dikemukakan oleh Garrison (1997).
RAJAH 2: Model Pembelajaran Sepanjang Hayat (Garrison, 1997)
Rajah 2: Model tersebut menunjukkan pembelajaran sepanjang hayat adalah proses berkitar
dengan empat tonggak utama:
(a) Kesedaran kendiri (Self awareness) pelajar mengenalpastikan identiti dan autonomi
mereka. Pelajar yang berautonomi mempunyai nilai dan kepercayaan sendiri, secara tidak
langsung akan mempengaruhi mereka semasa belajar (Candy 1991; Knowles et al., 2005).
(b) Merancang Pembelajaran - Planning for learning (Self management) :
penetapan objektif dan perancangan untuk mencapai objektif tersebut.
(c) Sedar apa yang perlu dipelajari - Understanding how to learn (Meta-learnig)
;Menggambarkan kesedaran pelajar tentang kaedah yang berbeza semasa belajar dan
pelbagai cara belajar.
(d) Penilaian pembelajaran - Evaluating learning (Self monitoring): Menunjukkan analisis
sistematik terhadap pelaksanaan belajar. Garrison mendefinisikan self monitoring ialah
tanggunjawab seseorang untuk menilai pengurusan pembelajaran mereka sendiri.
Mengenali diri
( Kesedaran Kendiri)
Perancangan Untuk
Belajar
( Pengurusan Kendiri)
Memahami Cara
Belajar
( Meta Belajar)
Penilaian Pembelajaran
( Pemantauan Kendiri)
Pelajar
Sepanjang
Hayat
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 215
PERBINCANGAN KAJIAN
E-pembelajaran : Isu dan Cabaran
Berdasarkan teori dan sorotan literatur terutamanya tentang pembelajaran berasaskan web (PBW),
dapat disimpulkan bahawa e-pembelajaran adalah evolusi pembelajaran yang memudahkan orang
dewasa meneruskan proses pembelajaran sepanjang hayat. Pembelajaran arahan kendiri secara
jarak jauh dan cross border education didapati lebih relevan, fleksibel dan memberi kebebasan
kepada pelajar untuk memulakan pembelajaran pada bila-bila masa berdasarkan keperluan
peribadi serta kesesuaian dengan komitmen terhadap keluarga, kerja dan kehidupan sosial mereka
(Zoraini Wati, 2008; Rozinah 2007; Rosenberg 2001; Talesra et al 2003, Smith dan Ragan 1993).
Namun apa yang penting ialah universiti maya perlu mengekalkan kualiti dan legitimasi
program akademik yang ditawarkan. Maka cabaran kepada pendidik adalah untuk menyediakan
ruang siber bagi menjayakan transformasi pengalaman pembelajaran dari persekitaran sebenar
kepada persekitaran pembelajaran secara maya.
Salah satu prinsip teori pembelajaran dewasa adalah peranan tutor hanya membantu pelajar
untuk mampu berdikari dan mempunyai arahan kendiri supaya bertanggungjawab berhadap
pengalaman pembelajaran mereka sendiri. Namun begitu pembelajaran kendiri tetap mempunyai
masalah. Seandainya pelajar lewat atau kurang mendapat maklumbalas dari tutor, maka mereka
tidak dapat maju dalam proses pembelajaran kendiri mereka. Ini kerana guru atau tutor masih lagi
merupakan orang yang pakar dan berautomi dari segi bahan kursus pembelajaran. Maka, tutor
perlu merekabentuk bahan dan aktiviti pembelajaran yang benar-benar dapat membimbing pelajar
kepada situasi pembelajaran persendirian secara online. Selain itu konsep pembelajaran kendiri
dan berautonomi bukan bermakna individu belajar secara terasing dari tutor dan pelajar lain.
Sebaliknya ia merupakan konsep pembelajaran yang memberi kuasa kepada individu untuk
bertanggungjawab terhadap pembelajaran mereka bersendirian dan pada masa sama terlibat secara
aktif dengan tutor dan pelajar lain.
Dari aspek sosioemosi, pembelajaran secara online terutamanya secara asinkroni bukan
sahaja mengubah peranan guru, tetapi sangat berfaedah kepada golongan pelajar yang pendiam dan
pemalu. Orang yang pendiam dan pemalu mungkin tidak berpeluang untuk memberi pendapat di
bilik darjah tradisional, sebaliknya mereka boleh turut serta secara aktif dalam forum perbincangan
maya, terutamanya di dalam forum e-kumpulan berbentuk asinkroni.
Bagi golongan pekerja, ICT membolehkan mereka lebih cepat menjadi k-pekerja (k-
workers) di tempat kerja berteknologi (technological savvy). Ini kerana penggunaan internet bukan
sahaja menjana pengetahuan, idea dan kemahiran baru kepada pekerja, malah pengupayaan
telekomunikasi seperti e-mel, e-chat, sidang video, telesidang dan kebolehan akses kepada
pangkalan data telah merevolusi e-pengurusan tanpa kertas. Selain itu, ia menjadi penghubung
antara kerja dan pembelajaran. Kini bilik darjah boleh datang ke persekitaran tempat kerja secara
latihan online atau melalui pengurusan maklumat tanpa mengira masa dan tempat. Tetapi akan
timbul masalah jika ada pegawai atasan yang tidak memahami dan berpendapat bahawa
pembelajaran atau latihan hanya diperolehi di dalam bilik darjah fizikal serta pelayaran maya
dianggap sebagai satu pembaziran masa. Maka menjadi cabaran kepada organisasi kerja
menwujudkan komuniti pembelajaran/berpengetahuan serta budaya pembelajaran.
Globalisasi dan teknologi internet telah berjaya menwujudkan senario pembelajaran
berterusan. Namun begitu, internet hanyalah teknologi yang memudahkan proses pencarian ilmu
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 216
pengetahuan dan kemahiran, jika individu tidak komited, maka internet akan gagal meningkatkan
kualiti pembelajaran itu sendiri. Pembelajaran terbuka dan jarak jauh masih boleh diancam oleh
masalah pelajar yang tidak aktif dan kehilangan minat. Keadaan ini boleh disebabkan oleh isu
bahawa transmisi maklumat secara maya menyebabkan kehilangan konteks personal antara
individu yang terlibat.
Motivasi orang dewasa juga satu masalah dan isu e-pembelajaran. Orang dewasa yang
berhasrat meneruskan pembelajaran secara online perlu membuat penilaian tahap kesediaan
belajar, serta mempunyai tahap kompetensi penggunaan komputer. Masalah teknikal seperti
teknofobia dan kekurangan latar belakang teknikal perlu diselesaikan sebelum memulakan program
pembelajaran berasaskan teknologi. Apabila kompetensi baik, maka lebih selesa dan mudah
menyesuaikan diri dengan e-pembelajaran. Selain itu, pengantara atau tutor hendaklah
menyediakan pelbagai strategi dan mengambil kira tahap pembelajaran yang boleh disesuaikan
dengan kepelbagaian latar belakang dan tahap kompetensi sedia ada pelajar.
Selain itu, kemudahan program hendaklah mesra pengguna iaitu pengguna boleh maju
mengikut keselesaan sendiri. Misalnya, dengan pengetahuan dan pengalaman sedia ada maka tidak
mustahil ada program atau bahan telah dikuasai oleh pelajar, maka bahan pembelajaran hendaklah
memberi alternatif yang membolehkan pengguna skip atau meninggalkan bahan yang tidak
diperlukan.
Memandangkan tugas tutor hanya sebagai fasilitator, tidak mustahil tutor membiarkan
pelajar belajar sendiri tanpa bimbingan dengan alasan orang dewasa mempunyai motivasi dalaman
yang tinggi. Ini menyebabkan kekurangan maklumbalas dari tutor sehingga boleh menyebabkan
pembelajaran tidak mempunyai haluan yang kukuh. Selain itu, masalah kecelaruan komunikasi
mungkin boleh berlaku akibat kesilapan melakukan pentafsiran disebabkan cara gaya sesuatu isu
atau komen ditulis. Komen fasilitator atau tutor mungkin disalah tafsir sebagai kritikan. Maka
tutor perlu berhati-hati semasa menghantar maklumbalas berkenaan tugasan pelajar. Selain itu,
potensi teknologi ini juga tidak menjamin akan wujud interaksi yang berkualiti kerana fleksibiliti
masa juga boleh mendatangkan masalah, seperti soalan pelajar kepada tutor atau forum
perbincangan kumpulan, mungkin mengambil masa yang lama untuk mendapat maklumbalas.
Selain itu, kemungkinan akan berlaku ketandusan nilai insaniah, dan kegagalan untuk berhubung
dengan orang lain.
RUMUSAN DAN KESIMPULAN:
Era globalisasi telah membawa arus perubahan kepada corak hidup dan sistem sosial
masyarakat dunia, termasuk di Malaysia. Oleh kerana kesan globalisasi tidak dapat dielakkan
maka, masyarakat perlu bergerak seiring dengan kepantasan perubahan yang dibawa oleh
globalisasi itu sendiri. Sebagai usaha untuk penyesuaian dalam era globalisasi maka penguasaan
ilmu dan pengetahuan baru dapat dilakukan melalui pembelajaran sepanjang hayat
Apa yang penting, komputer dan teknologi internet membantu meningkatkan keupayaan
pembelajaran dan perkembangan profesionalisme individu. Internet memberi peluang kepada
setiap orang meneruskan aktiviti pengajaran dan pembelajaran dalam pelbagai cara. Malah ia
membantu sistem masyarakat ke arah perkongsian maklumat. Maka pembuat dasar hendaklah
mengambil kira kesan teknologi terhadap latihan teknikal, pedagogi dan infrastruktur baru yang
diperlukan untuk melakukan transformasi terhadap sistem pendidikan terutamanya sekolah.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 217
RUJUKAN
Abdul Razaq Ahmad, Rozita Abdul Latif & Didin Saripudin. 2008. Masyarakat dan Pendidikan.
Bangi: Sutra Publication.
Asan Ali Golam Hassan (pnyt). 2007. Hala Tuju dan Cabaran Pembangunan Sektoral dan Sumber
Manusia dalam Rancangan Malaysia Kesembilan. Sintok: Universiti Utara Malaysia.
Aspin, David N., Chapman, J., Hatton, M. & Sawano Y. 2001. International handbook of lifelong
learning. 1
st
Ed. New York: Springer Publishing.
Chamhuri Siwar, Suetahman Kasstin Hassan & Norshamliza Chamhuri. 2007. Ekonomi Malaysia.
Ed.ke-6. Petaling Jaya: Pearson Malaysia Sdn. Bhd.
Colleta, N.J. 1996. Formal, Nonformal and Informal Education. Dlm. Tuijman, C. (pnyt.).
International Encyclopedia of Adult Education and Training. 2
nd
Ed. New York: Pergamon
Press.
Department for Education and Employment. 1998. Learning Communities: A Guide to Assessing
Practice and Processes. Sudbury: DfEE Publications Centre.
Garrison, D.R., 1997. Self-directed learning: Toward a comprehensive model. Adult Education
Quarterly 48: 16-18.
Gelpi, E. 1995. Lifelong Education. United Kingdom: Bertrams Print On De.
Gunn, S. & Cedric Cullingford. 2005. Globalisation, Education and Culture Shock: Monitoring
Change in Education. United Kingdom: Ashgate Publishing Company.
Hairi Abdullah. 1989. Penduduk Semenanjung Malaysia. Bangi: Penerbit Universiti Kebangsaan
Malaysia.
Hargreaves, David H. 2004. Learning for Life: The Foundations of Lifelong Learning. United
Kingdom: Policy Press.
Hasan, A. 1996. Lifelong learning. Dlm. Tuijnman, C. (pnyt.). International Encyclopedia of Adult
Education and Training. 2
nd
Ed. New York: Pergamon Press.
Holford, Jarvis. 1998. International Perspectives on Lifelong Learning. 1
st
Ed. United States:
Routledge.
Hunt, L. 2004. Creative E-Transition. Dalam E-education Applications: Human Factorss and
Innovative Approaches. (Claude Ghaoui, editor). UK:Idea Group Inc.
Jabatan Perangkaan Malaysia. 1991. Laporan banci penduduk 1980, 1991. Jil. 1. Kuala Lumpur:
Jabatan Perangkaan Malaysia.
Jabatan Perangkaan Malaysia. 2000. Buku Tahunan Perangkaan Malaysia 2000. Kuala Lumpur:
Jabatan Perangkaan Malaysia.
Karoulis, A. et al. 2004. An Expert-Based Evaluation Concerning Human Factors in ODL
Programs: A Preliminary Investigation. Dalam E-education Applications: Human Factors
and Innovative Approaches. (Claude Ghaoui, editor). UK:Idea Group Inc.
Kementerian Pengajian Tinggi Malaysia. 2007. Pelan Strategik Pengajian Tinggi Negara
Melangkah Tahun 2020. Putrajaya: Kementerian Pengajian Tinggi.
Knowles, Malcolm S., Holton, Elwood F. & Swanson, Richard A. 2005. The Adult Learner: The
Definitive Classic in Adult Education and Human Resource Development. 6
th
Ed.
Burlington: Elsevier.
Long, H.B. 1990. Lifelong learning: Pressure for Acceptance. Journal of Research and
Development in Education 7: 2-12.
Longworth, N. 2003. Lifelong Learning in Action: Transforming Education in the 21
st
Century.
London: Kogan Page Limited.
Mahathir Mohamad & Hashim Makaruddin. 2002. Globalisation and the new realities: Selected
Speeches of Dr. Mahathir Mohamad, Prime Minister of Malaysia. Subang Jaya: Pelanduk
Publications (M) Sdn. Bhd.
Malaysia. 1996. Racangan Malaysia Kesembilan 2006-2010.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 218
Mazanah, M. 2001. Adult and Continuing Education in Malaysia. Kuala Lumpur: Universiti Putra
Malaysia.
Merriam, S.B. & Caffarella. R.S. 1999. Learning in Adulthood: A Comprehensive guide. San
Francisco: Jossey-Bass Publishers.
Mok Soon Sang. 2007. Pengajaran dan Pembelajaran: Kursus Penilaian Tahap Kecekapan.
Puchong: Multimedia-ES Resources Sdn. Bhd.
Noe, Raymond A. et al. 2006. Human Resource Management: Gaining a Competitive Advantage.
5
th
Ed. Boston, Mass: McGraw-Hill.
Okamoto, T & Kayama, M. 2004. Integrated E-Learning System and Its Practice. Dalam E-
education Applications: Human Factorss and Innovative Approaches. (Claude Ghaoui,
editor). UK:Idea Group Inc.
Oliver, Paul. 2005. The Concept of Globalisation and Culture. Dlm. Gunn, S. & Cedric Cullingford
(pnyt.). Globalisation, Education and culture shock. United Kingdom: Ashgate Publishing
Company.
Resnick, L.B and Wirth, J.G. 1996. The changing of workplace: New challenges for Education
Policy and Practice. San Francisco: Jossey-Bass Publishers.
Robertson, Roland. 1992. Globalization: Social Theory and Global Culture. London: Sage
Publications.
Sarjit Kaur, Morshidi Sirat & Norzaini Azman. 2008. Globalisation and Internationalisation of
Higher Education in Malaysia. Pulau Pinang: Penerbit Universiti Sains Malaysia.
Sekolah Pendidikan Jarak Jauh. 2009. Universiti Sains Malaysia.
Shahril @Charil Marzuki, 2005, Mengurus dan Membiayai Pendidikan di Malaysia, Kuala
Lumpur: PTS Profesional Publishing Sdn. Bhd.
Sharifah Norazizan & Nurizan Yahya. 2005. Peranan dan Cabaran dalam Mensejahterakan
Warga Tua. Serdang: Universiti Putra Malaysia.
Sharon, B, M et al, 2007, Learning in Adulthood: A Comprehensive Guide (3
rd
edt), USA: Jolley
Bass
Sufean Hussin, 2004, Pendidikan di Malaysia: Sejarah, Sistem dan Falsafah (2
nd
edit), Kuala
Lumpur: Dewan Bahasa dan Pustaka.
Sutherland, P. 2006. Lifelong Learning: Concepts and Contexts. United States: Routledge.
Thomas, Elwyn. 2005. Globalisation, Cultural Diversity and Teacher Education. Dlm. Gunn, S. &
Cedric Cullingford (pnyt.). Globalisation, Education and Culture Shock. United Kingdom:
Ashgate Publishing Company.
Toth, Janos, 2002, Learner Partnership An Integrated Approach to Adult Education,
International Conference on Lifelong Learning, ASEM, University of Malaya.
Williams, Elizabeth, 1996, SoYou Want To Teach Adult?, Canada: Pifin Publishing.
Zoraini Wati Abas. 2008. Globalisation of education through open distance learning. Dlm Sarjit
Kaur, Morshidi Sirat & Norzaini Azman (pnyt.). Globalisation and Internationalisation of
Higher Education in Malaysia. Pulau Pinang: Penerbit Universiti Sains Malaysia.
(Atas talian)
http://www.utusan.com.my/utusan/info.asp?y=2008&dt=0120&pub=Utusan_Malaysia&sec=Muka
_Hadapan&pg=mh_07.htm
http://linux.or.id/files/MKP-13-2-6.pdf
http://www.jpa.gov.my/docs/pelbagai/ubulanan/2005/Feb-BL.pdf
http://www.lppkn.gov.my/bm/artikel_disember.pdf
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 219
A LINK USAGE MATRIX FOR OSPF ROUTING
Nor Musliza Mustafa
Faculty of Information Science and Technology
Selangor International Islamic University College
normusliza@kuis.edu.my
Abstract
The Open Shortest Path First (OSPF) is a link-state routing protocol that support equal cost
load-balancing process. The OSPF traffic routed along shortest path and splits the load
equally at nodes where a several outgoing links on the shortest paths to the same destination
IP address. The OSPF link weight-setting problem seeks a set of link weights to optimize a
cost function and network performance. This paper presents a link usage matrix for load
balancing that solves the problems of minimizing the usage of demand matrix and reduce
time executions needed in the optimization process. Results show that our link usage matrix
work better in terms of routing cost and network performance.
Keywords: OSPF, Routing, Load Balancing
1. Introduction
Open Shortest Path First (OSPF) is the most commonly used intra-domain Internet routing
protocol (B. Fortz and M. Thorup, 2004). Routers compute shortest paths and creates a table
that controls the forwarding of each IP packet to the next hop in its route. In the case of
multiple shortest paths, OSPF will use load balancing and split the traffic flow evenly over
several shortest paths (J. Moy, 1998). In general, the current shortest path routing suffers a
problem of arising congested links (Fortz et al., 2002b) (Fortz and Thorup, 2004). It is due to
the extremely usage of the shortest paths, while the other paths are unutilized. Many ISPs
have a huge infrastructure based on routers running shortest path protocols like OSPF
(Retvari and Cinkler, 2004). Congested links could appear if they have lower link weights
because all the traffic from any source to any destination will follow the shortest paths, while
still other links or paths unutilized (Fortz and Thorup, 2002a).
This paper presents a link usage matrix for load balancing that solves the problems of
minimizing the usage of demand matrix and reduces time executions needed in the
optimization process. A new proposed Matrix Usage Method (MUM) is developed. Results
show that our link usage matrix work better in terms of routing cost and network
performance.
2. METHODOLOGY
This research optimizes OSPF link weights in order to improve the operational networks
performance. A simulator that runs Fortz and Thorups optimization model has been
optimized.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 220
2.1 INPUT PART
This input part reads the network topologies and the traffic demand matrices and gives them
along with the initial weights to the routing part. Two types of modeled topologies are used in
this research. They are originally used in Fortz et al. (2002b) and available with their traffic
demands online at Resende et al. (2006). The generation of the modeled topologies is Two-level
hierarchical networks: this topology is produced using GT-ITM generator as suggested in
Zegura et al., (1996) and Calvert et al. (1997) which is the most realistic model for modeling
networks (B. Fortz and M. Thorup, 2004). In this topology, two types of links are modeled; local links
with 200 units of capacity and long distance links with 1000 units of capacity and Waxman
networks: in this topology the routers are uniformly distributed over a unit square.
2.2 ROUTING PART
This routing part uses the information from the input part in order to compute the shortest
paths between each node pairs and then distributes the traffic capacity over the links
belonging to the shortest paths between each source destination pair. Depending on the traffic
distribution, this part computes the routing cost based on a current set of weights and a traffic
demand matrix.
2.3 WEIGHT OPTIMIZATION PART
The weight optimization part is used to optimize network link weights. Link weights affect
shortest path selection, traffic distribution, and finally network routing cost. At the first
iteration, the routing part uses the initial weights to compute: initial shortest paths and initial
routing cost value. At the subsequent iterations; a new weights will be produced by the
optimization part. The new weights will change the shortest paths, the load distribution, and
the routing cost.
2.4 OUTPUT INFORMATION PART
This part receives the following information from the weight optimization part which are
- Routing Cost : is the routing cost is the lowest cost value found during the optimization of
the initial weights,
- Link Usage of each link : is the usage of each link that provided with counter selection
- Time Execution: is the minutes needed for optimizing link weights.
3. EXPERIMENTAL RESULTS AND DISCUSSION
This section presents and discusses simulation results obtained from different optimization
methods for setting OSPF weights. The simulator uses either a default weight setting like
Unit, Inv, or optimized weights using methods like EBH and MUM. Default weights are
assigned directly to the links in the routing part of the simulator; while optimized weights are
assigned to the links after being optimized in the optimization part. Weights are used to
compute the shortest paths and then the shortest paths identify the amount of traffic that will
pass over each link depending on an estimated or measured traffic demand matrix.
The default and the optimization methods used in the simulation for setting OSPF weights are
as follows:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 221
- Unit: this default weight setting method assigns a weight value equal to one. This type of
weights is used as initial weights for the optimization process in the framework and hence
in the simulation weight optimization part.
- Inv: this default weight setting method assigns for each link a weight value inversely
proportional to its capacity. This weight setting method is recommended by Cisco.
- EBH: this weight optimization method assigns for each link a weight value obtained from
the weight optimization part of the simulator.
- MUM: this weight optimization method assigns for each link a weight value obtained
from the weight optimization part of the simulator with counter selection.
Cost average and best cost results for hierarchal networks in Table 1 to Table 2 below show
that: the weight optimization methods EBH and MUM perform better than the default weight
setting method Unit and Inv. This performance is because the optimization methods solve a
problem of excessive usage of the shortest paths, by using any available path between source
destination pairs; hence reducing congestions. The results also show that MUM perform
better than EBH in the two hierarchal networks. This performance is due to solving the
problems found in EBH. Hierarchal networks have a variety of link capacities, which is more
near to real networks. These networks have 12% to 26% of their links with capacity of 1000
units; while the other links are with capacity of 200 units (Buriol et al.., 2005). That means the
links with 1000 units of capacity will be used frequently; hence they will be congested.
Cost average and best cost results for Waxman network in Table 3 below show that the
performance of the weight optimization methods EBH, MUM is better than the performance
of the default weight setting method Inv. Weight optimization methods performance is
caused by solving the problem of excessive usage of the shortest paths, and hence reducing
traffic congestions. The results also show that MUM performs better than EBH in a Waxman
network.
Table 1: Cost average and best cost for hier-1 network
Default
Weights
Optimized Weights
Cost Cost Average Best Cost
Scaled
Demand
Unit Inv EBM MUM EBM MUM
1 21.32 37.73 1.50 1.40 1.41 1.40
2 50.30 56.18 2.01 1.59 1.75 1.65
3 79.26 75.97 6.81 1.95 2.31 1.80
4 119.52 106.90 19.81 4.19 3.76 4.30
5 168.67 140.52 64.83 8.10 20.37 9.50
6 222.01 180.30 113.12 32.57 51.71 28.65
Cost
Sum
661.08 597.60 208.08 49.80 81.31 47.30
Improvement
Against Unit
10% 69% 92% 88% 93%
Improvement Against EBM 76%
42%
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 222
Table 2: Cost average and best cost for hier-2 network
Default
Weights
Optimized Weights
Cost Cost Average Best Cost
Scaled
Demand
Unit Inv EBM MUM EBM MUM
1 33.71 27.66 1.60 1.38 1.52 1.45
2 50.66 44.14 3.58 1.67 2.23 1.40
3 73.84 63.9 23.97 3.87 7.70 2.05
4 102.83 95.13 51.81 5.39 8.88 2.70
5 135.13 128.35 81.70 6.61 76.85 5.72
6 167.47 159.85 105.86 34.55 99.48 17.51
Cost
Sum
581.42 530.76 275.09 59.91 203.15 37.23
Improvement
Against Unit
8% 52% 91% 65% 95%
Improvement Against EBM 80%
84%
Table 3: Cost average and best cost for waxman network
Default
Weights
Optimized Weights
Cost Cost Average Best Cost
Scaled
Demand
Unit Inv EBM MUM EBM MUM
1 1.6 1.6 1.47 1.48 1.46 1.50
2 3.9 3.9 1.75 1.72 1.71 1.70
3 20.63 20.63 2.26 2.25 2.17 2.15
4 45.77 45.77 4.13 3.91 3.48 3.65
5 84.41 84.41 16.04 13.62 10.12 14.11
6 139.52 139.52 62.42 41.19 51.98 23.67
Cost
Sum
302.41 302.41 94.60 70.70 77.43 53.31
Improvement
Against Unit
0% 70% 78% 76% 84%
Improvement Against EBM 27%
34%
Execution time results for Hier-1, Hier-2 and Waxman network in Table 4 to Table 6 below
show that the performance of the weight optimization methods MUM is better than the
performance of the EBH setting method.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 223
Table 4: Execution time for hier-1 network
Average
Time
Scaled
Demand
EBM EBM
1 2.50 2.11
2 2.03 1.76
3 1.86 1.48
4 1.68 1.53
5 1.47 1.37
6 1.46 1.30
Cost Sum 11.00 9.55
Average
T
avg
2.25 2.06
Improvement
Against EBM
7%
Table 5: Execution time for hier-2 network
Average
Time
Scaled
Demand
EBM EBM
1 13.41 2.36
2 12.78 2.16
3 12.76 1.88
4 11.30 1.60
5 11.10 1.51
6 9.00 1.42
Cost Sum 70.35 10.93
Average
T
avg
5.86 1.82
Improvement
Against EBM
69%
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 224
Table 6: Execution time for waxman network
Average
Time
Scaled
Demand
EBM EBM
1 4.25 3.45
2 3.50 3.09
3 3.04 2.73
4 2.76 2.34
5 2.41 1.96
6 2.02 1.79
Cost Sum 17.98 15.36
Average
T
avg
3.00 2.56
Improvement
Against EBM
15%
4. CONCLUSIONS
Our improved balancing heuristics MUM solve the problems respectively. The results
showed remarkable improvements in the cost function and the convergence speed. As an
extension for this work, we hope to test more topologies, more demand patterns and the
context of robustness to study in more details the influence of these problems.
References
B. Fortz, J. Rexford, M. Thorup (2002). Traffic engineering with traditional IP routing
protocols. IEEE Communication Magazine, vol. 40, pp. 118-124.
B. Fortz and M. Thorup (2004). Increasing Internet capacity using local search.
Computational Optimization and Applications, vol. 29, no. 1, pp.13-48.
B. Fortz and M. Thorup (2002). Optimizing OSPF/IS-IS weights in a changing world. IEEE
Journal of Selected Areas Communication, vol. 20, , pp. 756-767.
Buriol L. S., Resende M. G. C., Ribeiro C. C., and Thorup M. (2005). A Hybrid genetic
algorithm for the weight setting problem in OSPF/IS-IS routing. Networks, vol. 46,
no. 1, , pp. 36-56.
Calvert K., Doar M., and Zegura E. W. (1997). Modeling Internet topology. IEEE
Communication Magazine, vol. 35, no. 6, pp. 160-163.
J. Moy, OSPF version 2, RFC 2328, Apr. 1998.
Resende M. G. C., AT&T Labs Research, Data of weight setting in OSPF Routing, Accessed
on 2006. Availableonlineat:http://public.research.att.com/~mgcr/data/index.html.
Zegura E.W., Calvert K.L., and Bhattacharjee S. (1996). How to model an internetwork.
INFOCOM '96. Fifteenth Annual Joint Conference of the IEEE Computer Societies.
Networking the Next Generation. Proceedings IEEE , vol. 2 , ,pp. 24-28.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 225
PERKEMBANGAN TEKNOLOGI MAKLUMAT DAN KOMUNIKASI:
PENGGUNAANNYA DALAM INDUSTRI PENERBITAN
Siti Ezaleila Mustafa
Jabatan Pengajian Media,
Fakulti Sastera dan Sains Sosial
Universiti Malaya
ezaleila@um.edu.my
Abstrak
Perkembangan teknologi maklumat dan komunikasi (ICT) terutama dengan Internet sebagai
pemangkin, menyaksikan wujudnya persaingan dalam semua urusan, termasuk dalam urusan
perdagangan dan perniagaan. Syarikat atau organisasi yang bijak memanfaatkan segala
teknologi yang wujud dan merebut peluang yang datang akan dapat terus bersaing dan
mengukuhkan kedudukan mereka dalam persekitaran ekonomi yang bersifat kompetitif
lebih-lebih lagi dalam era ekonomi digital. Industri penerbitan mediayang memberikan
sumbangan yang tidak terhingga nilainya kepada tamadun manusiajuga tidak ketinggalan
dalam memanfaatkan teknologi dan media baharu ini. Aktiviti pemasaran dan penyebaran
produk intelektual ini kini merentasi batasan geografi dan boleh dilakukan pada bila-bila
masa dengan bantuan media baharu ini. Memandangkan penggunaan Internet telah menjadi
kemestian masyarakat era globalisasi sehingga munculnya budaya siber, maka penggunaan
media baharu ini telah menjadi suatu kemestian atau trend dalam pelbagai organisasi dan
industri, termasuk penerbitan media. Makalah ini akan melihat dan membincangkan
penggunaan media baharu ini dalam kalangan pelaku industri penerbitan seperti penerbit,
penulis, dan pekedai buku di Malaysia dalam usaha untuk merapatkan jurang antara pelbagai
pihak, terutama dengan pengguna, di samping meluaskan pasaran mereka.
Kata Kunci: Internet, industri penerbitan, teknologi maklumat dan komunikasi, media baharu,
globalisasi.
1 Pengenalan
Perkembangan teknologi maklumat dan komunikasi (ICT) yang berlaku banyak membantu
industri penerbitan daripada proses penciptaan hinggalah penyebaran produk budaya ini.
Dengannya, aktiviti penerbitan bertambah mudah dan meluas. Sebelum ini, pada zaman
pertengahan, media cetak, khusunya buku, bukan untuk diperdagangkan secara komersial dan
hanya boleh dimiliki oleh golongan tertentu. Ini kerana bahan-bahan bertulis dihasilkan
secara eksklusif oleh para rahib yang bertindak sebagai jurutulis atau penyalin. Sebagai satu-
satunya tempat simpanan buku, pihak gereja pada zaman itu mempunyai kuasa untuk
mengawal maklumat yang boleh sampai kepada masyarakat (Folkerts, Lacy, & Larabee,
2004).
Dalam era ledakan maklumat, teknologi maklumat dan komunikasi (ICT) semakin
menggantikan kaedah lama dalam memperoleh, menyimpan, dan menyebarkan maklumat.
Kehadiran Internet sebagai media baharu yang menjadi pemangkin ICT memberi manfaat
kepada industri penerbitan dan yang berkaitan dengannya. Tambahan pula teknologi ini
sangat releven dengan industri ini kerana produk yang terhasil boleh didigitalkan di samping
mewujudkan cara baharu yang menarik untuk memahami dan merapati konsumer serta
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 226
membantu pengedaran produk dengan efisien dan berkesan serta berkomunikasi dengan
konsumer sama ada dalam kumpulan mahupun secara individu. Oleh sebab itu, pihak
penerbit, penulis, dan pekedai bukuyang terlibat dalam industri ini semakin ramai yang
memanfaatkan ICT ini dalam keseluruhan proses penerbitan media.
2 Perkembangan Teknologi Perkomputeran & Internet
Menurt McLuhan (1962), menerusi teknologi, manusia telah melalui empat era yang berbeza:
era tribal, era celik, era cetak, dan era elektronik. Ini seterusnya menyebabkan komunikasi
manusia semakin berkembang, iaitu daripada percakapan kepada tulisan hinggalah kepada
komunikasi interaktif dan digital. Ini semua disebabkan pembangunan dan perkembangan
teknologi maklumat dan komunikasi, terutama dengan kewujudan komputer.
Kini, ICT terutama dengan gabungan teknologi komputer, teknologi siber, dan digital
menjadi alat global yang berupaya menembusi pelosok dunia atau ke mana-mana sahaja
untuk menyebarkan pelbagai jenis maklumat dan mencipta alam realiti maya. Komputer kini,
boleh dihubungkan dengan pelbagai saluran dan media yang menyebabkan lahirnya teknologi
baharu; dan yang amat popular pada era modenisasi ini, iaitu Internet. Internet menjadi media
yang sangat popular dan digunakan oleh hampir semua orang di seluruh dunia.
Oleh sebab itu, Internet dan web serta pembangunan aplikasi yang laindan kelebihan yang
ditawarkannyaturut diadaptasikan oleh pihak-pihak yang terlibat dalam industri penerbitan
media. Ini menunjukkan pelaku industri ini turut menyedari kepentingan ICT dalam usaha
menyebarkan produk mereka kepada khalayak yang lebih luas di samping merapatkan jurang
komunikasi dengan pelbagai pihak dalam industri penerbitan sehingga membentuk jaringan
global.
3 ICT Dalam Industri Penerbitan Media
Penerbitan media mempunyai perhubungan yang rapat dengan perkembangan dan
pembangunan teknologi. Oleh sebab itu, sebarang perubahan dalam ICT, temasuk Internet,
akan turut mempengaruhi dan memberi impak kepada indutri ini lebih-lebih lagi industri
penerbitan semakin kompleks, multisaluran, dan sebuah perniagaan penyebaran kandungan
yang kaya media. Namun, kekompetenan atau kecekapan utamanya adalah mengumpul dan
mempakejkan kandungan ke dalam produk media. Impak itu boleh dilihat dalam proses kerja
dalaman, produk media itu sendiri, pengedaran produk, dan strategi pemasaran.
Kini, industri penerbitan termasuk di Malaysia menyaksikan evolusi yang digerakkan oleh
pembangunan pesat teknologi baharu dan perubahan corak dalam perlakuan pengguna. ICT
sangat relevan dengan sektor penerbitan kerana kebanyakan perkhidmatan yang terdapat di
dalamnya boleh dilakukan secara digital. Oleh sebab itu, pelaku dalam industri ini perlu bijak
menggunakan teknologi yang sentiasa berubah dalam urusan mereka termasuklah pengurusan
aliran kerja dan pengadaptasian model ekonomi dan penyampaian digital. Maka, pada masa
kini, banyak pihak dalam industri ini yang telah mengintegrasikan aplikasi Internet ke dalam
aktiviti perniagaan yang dijalankan.
3.1 Penggunaan Laman Web
Dalam dunia tanpa sempadan kini, kehadiran dan kewujudan sesebuah organisasi dapat
disebarkan dengan meluas dengan hanya menghadirkan diri dalam dunia siber atau secara
maya. Di samping kehadiran dan kewujudan secara fizikal, semakin ramai pihak yang terlibat
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 227
dalam industri penerbitan memasuki ruang siber dengan membina laman web organisasi
masing-masing. Dengan cara ini, kehadiran mereka lebih mudah diketahui oleh sesiapa
sahaja. Laman web kini dilihat sebagai suatu keperluan kepada semua organisasi untuk terus
bersaing dalam era ekonomi digital. Oleh sebab itu, semakin banyak penerbit, penjual buku,
pencetak membina laman web sebagai alat representasi maya dalam alam siber.
Pembinaan laman web akan sentiasa mewujudkan aktiviti pemasaran dan penjualan ke
seluruh dunia sepanjang masa selama 24 jam setiap hari. Laman web yang dibina juga dapat
memberi penambahan nilai yang lebih baik berbanding teknik komunikasi yang lain kerana ia
dapat menyampaikan maklumat secara terus kepada orang ramai dalam pelbagai format
seperti teks, bunyi, grafik, imej, dan animasi. Bagi pihak penerbit laman web boleh
digunakan untuk (i) menjual buku-buku terbitan mereka terus kepada pembaca atau pengguna
akhir; (ii) menghantar konsumer kepada pengedar atau premis-premis runcit yang menjual
buku-buku terbitan mereka, dan (ii) menghebahkan terbitan dan pengarang kepada khalayak
seluruh dunia. Namun, laman web yang dibina perlu diketahui serta dapat menaik perhatian
pelayar Internet. Jika kewujudan laman web yang dibina tidak diketahui, ia adalah sia-sia..
Terdapat pelbagai alasan untuk menggunakan laman web (Sterne 1997). Antara alasan
tersebut adalah seperti yang berikut: (i) memaparkan imej korporat; (ii) membaiki
perkhidmatan untuk pelanggan sedia ada; (iii) meluaskan pasaran; (iv) melakukan transaksi
dalam talian; (v) edaran maklumat secara global; dan (vi) kos komunikasi yang rendah. Ia
juga dapat membantu penerbit memperoleh faedah-faedah seperti yang berikut: (i)
mendapatkan lebih ramai pelanggan; (ii) meningkatkan kesedaran awam terhadap organisasi
dan produk atau terbitan mereka; dan (iii) meningkatkan penjualan produk mereka.
Kebanyakan penerbit, termasuk di Malaysia, menggunakan laman web yang dibina sebagai
alat perhubungan awam dan medium baharu periklanan dengan memaparkan maklumat
berkaitan syarikat masing-masing seperti maklumat tentang penerbit, katalog penerbitan,
edisi atau penerbitan judul baharu, maklumat tentang pengarang dan sebagainya. Bagi Yesil
(1997), Internet merupakan medium baharu periklanan yang terbaik selepas kehadiran
televisyen dan terdapat perbezaan yang besar antara periklanan tradisional dengan Internet.
Periklanan tradisional merupakan aktiviti pasif yang membolehkan orang ramai menerima
mesej tanpa mencarinya. Namun, Internet adalah segala-galanya kecuali pasif (Yesil 1997:
130). Tiada apa-apa yang berlaku di depan skrin pengunjung sehingga tetikus diklik.
Ini boleh dilihat dalam laman web penerbit seperti MDC Publishers, Mybooks.com.my (yang
dibangunkan oleh Utusan Publications and Distributors), Yayasan Tun Jugah, Dewan Bahasa
dan Pustaka, dan United Publishing House. Namun, ada juga yang membenarkan pembaca
atau pengguna memberikan reaksi atau maklum balas dengan membentuk forum atau
kumpulan perbincangan antara pembaca dengan penerbit atau pengarang seperti yang
dilakukan oleh Alaf 21 Sdn. Bhd., Penerbit Fajar Bakti Sdn. Bhd., dan Creative Enterprise.
Dengan cara ini, komunikasi dengan pelanggan dapat dilakukan sekerap mungkin pada bila-
bila masa tanpa sempadan geografi.
3.2 Penerbitan Elektronik
Peningkatan penggunaan Internet saban tahun di seluruh dunia juga boleh dimanfaatkan oleh
penerbit dengan menghasilkan penerbitan elektronik atau penerbitan dalam talian disebabkan
semakin ramai yang mencari maklumat dan membaca menerusi Internet. Oleh sebab itu,
selain bentuk penerbitan bercetak, banyak juga surat khabar dan majalah telah diterbitkan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 228
dalam bentuk penerbitan dalam talian seperti Kompas, Jakarta Post, Tempo, Detik, Berita
Harian, The Star, Utusan Malaysia, Kosmo, Sinar Harian, dan sebagainya. Melalui
penerbitan dalam talian ini, berita tentang pelbagai negara boleh diketahui dengan mudah
oleh sesiapa sahaja tanpa batasan pada bila-bila masa.
Penerbitan elektronik ialah suatu bentuk yang memperlihatkan bahan terbitan dikeluarkan
dan disimpan secara elektronik bukan dalam bentuk cetakan. Malah ia merujuk pada proses
yang menggunakan bantuan komputer untuk mencari, membentuk, menyimpan, dan
mengemas kini kandungan maklumat kepada khalayak. Kualiti yang terhasil sama seperti
penerbitan biasa (Saxena 2009). Penerbitan elektronik boleh merujuk pada buku elektronik,
periodikal elektronik, penerbitan mel elektronik, penerbitan multimedia, dan kandungan
digital.
Menurut Persidangan Bangsa-Bangsa Bersatu Mengenai Perdagangan dan Pembangunan
(UNCTAD), penerbitan bentuk ini memberi peluang kepada penerbit kecil untuk
mengukuhkan kehadiran mereka di pasaran yang dimonopoli oleh penerbit-penerbit besar
dalam industri budaya ini. Dengan mengurangkan kos dan peranan orang tengah, ia dapat
membuka pasaran baharu kepada penerbit. Penerbitan elektronik terdiri daripada teknologi
dan model perniagaan yang melibatkan penghasilan, penyelenggaraan, pengarkiban dan
pengedaran dokumen (buku, jurnal, majalah, surat khabar dan lain-lain) dalam bentuk
elektronik dan/atau melalui komputer. Ini bermakna segala proses penerbitan bermula
daripada penghasilan dokumen oleh penulis sehingga dokumen tersebut sampai kepada
pembaca tidak lagi berasaskan kertas, tetapi berasaskan elektronik dan menggunakan
teknologi komputer. E-buku membolehkan sesiapa sahaja membaca sebarang dokumen
digital dalam pelbagai format fail sama ada dalam format PDF, Word, dan HTML di
komputer, telefon bimbit, atau pembantu digital peribadi (PDA).
Di Indonesia, Penerbit Mizan menjadi perintis kepada penerbitan buku elektronik apabila
menerbitkan Wasiat Sufi Imam Khomeini kepada Putranya, Ahmad Khomeini pada tahun
2001. Selepas itu, penerbit berkenaan juga menerbitkan buku elektronik tentang perjalanan
syarikat berkenaan yang berjudul Mosaik Mizan. Orang ramai boleh mendapatkannya secara
percuma dengan memuatturunkan fail dari laman webnya, www.mizan.com atau
www.ekuator.com. Di Malaysia pula, terdapat beberapa penerbit yang berusaha
mempopularkan penerbitan elektronik. Selain menerbitkan buku-buku bercetak, Dewan
Bahasa dan Pustaka, melalui Karyanet, turut menerbitkannya secara elektronik. Orang ramai
boleh membelinya dan membacanya dengan menggunakan perisian Adobe Acrobat atau
Adobe Reader. Malah melalui Karyanet juga disediakan komik elektronik secara percuma,
khususnya untuk kanak-kanak.
PTS Publications pula dengan kerjasama Metadome Sdn Bhd menerbitkan beberapa novel
remajanya dalam bentuk buku mudah alih (dikenali sebagai m-book atau mobile book) dan ia
dikatakan mendapat sambutan hangat. Mbook ialah aplikasi berasaskan Java yang
membolehkan buku dibaca dengan menggunakan telefon mudah alih. Buku bentuk ini juga
dilengkapi dengan pelbagai ciri multimedia dan elemen interaktif yang menarik. Dengan caj
muat turun sebanyak RM5 sahaja, orang ramai kini boleh membaca novel yang tebalnya
sehingga kira-kira 480 muka surat menerusi skrin telefon bimbit . Yang diperlukan hanyalah
telefon bimbit yang dilengkapi aplikasi Java, GPRS atau 3G. Di Jepun, teknologi sebegini
juga mendapat sambutan yang memperlihatkan lima daripada sepuluh novel best-selling
adalah berasal daripada cellphone novel (maktabati09.blogspot.com).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 229
Penerbitan elektronik bukan hanya digunakan oleh penerbit malah juga turut dimanfaatkan
oleh pengarang. Karya Stephen King The Plant misalnya telah menggunakan kemudahan
penerbitan elektronik yang ada dengan membenarkan novelnya itu diakses oleh pembaca dari
satu bab ke satu bab dari laman webnya (www.stephenking.com) dengan menggunakan
format PDF. Beliau hanya meminta pembaca membayar AS$1 terhadap bab yang telah
dpindahturunkan. Berbeza dengan pengarang-pengarang lain, King bergantung pada
kepercayaan dan kejujuran kerana The Plant ditulis dan disebarkan bab demi bab dalam satu
jangka masa yang memerlukan kesabaran dan ingatan daripada pembaca. Walaupun beliau
berhubung dan memasarkan terus hasil karyanya kepada pembaca tanpa melalui saluran
konvesional, beliau masih mampu memperoleh pulangan yang baik, iaitu AS$463,832.27.
Salah seorang pengarang di Malaysia yang menggunakan cara ini ialah Onn Yeoh. Beliau
menggunakan teknologi ini dengan menghasilkan buku elektroniknya yang berjudul
Transitiondalam format PDFyang memaparkan perkara berkaitan era digital di
www.transitionbook.com/buy_online.htm. Mereka yang berminat diberi beberapa pilihan
sama ada untuk membeli keseluruhan buku berkenaan, melakukan pembelian berdasarkan
topikTechnology, Issues, New Media dan Concepts ataupun berdasarkan bab.
Namun, tidak ramai pengarang di Malaysia yang memanfaatkan teknologi ini sepenuhnya.
Kewujudan penerbitan elektronik ini membolehkan banyak karya pengarang baharu
dipasarkan dan dibaca kerana kebanyakan penerbit kini bersikap pemilih dan tidak mahu
menanggung risiko menerbitkan karaya-karya baharu terutama oleh pengarang yang belum
mencipta nama.
3.3 Karya dalam Talian
Perkembangan teknologi maklumat dan komunikasi memberi peluang kepada pengarang
untuk mendekatkan diri mereka dengan pengguna atau pembaca. Mereka boleh
memanfaatkan teknologi untuk menghasilkan kandungan digital atau terbitan dalam talian
terhadap karya mereka untuk dikongsi bersama pembaca atau peminat. Kandungan digital
umumnya merujuk pada penyampaian elektronik sesebuah karya namun ia lebih pendek
daripada karya asal atau disampaikan secara sedikit demi sedikit (Saxena, 2009). Malah
mereka boleh membantu usaha-usaha pemasaran bagi hasil karya mereka dengan lebih
mudah tanpa perlu terlalu bergantung kepada pihak-pihak lain seperti penerbit, peruncit buku,
pengedar, dan sebagainya.
Teknologi ini juga dilihat membawa sinar baharu kepada pengarang, terutama pengarang-
pengarang baharu yang sukar meyakinkan penerbit untuk menerbitkan karya mereka.
Teknologi ini membolehkan pengarang-pengarang yang tidak dikenalimalah semua
pengarangmenyebarkan karya mereka dalam bentuk kandungan digital kepada orang
awam dengan lebih mudah. Para pengarang juga tidak perlu lagi terlalu bergantung kepada
penerbit kerana mereka boleh menerbitkan dan sekali gus memasarkan karya-karya mereka
kepada orang ramai dan pasaran yang lebih luas.
Kegemaran golongan muda membaca dan mendapatkan maklumat di ruang siber juga
memberi peluang kepada pengarang untuk memanfaatkan teknologi baharu ini. Maka, ada
pengarang yang menggunakan blog masing-masing untuk menyiarkan karya mereka untuk
dibaca oleh pengunjung. Ada yang memuatkan karya puisi dan ada juga yang memuatkan
cerpen dalam talian seperti Ook Nugruho (ooknugroho.blogspot.com), Hasan Aspahani
(sejuta-puisi.blogspot.com), dan Roy Manu Leveran (roymanu.blogspot.com). Ada juga
penulis yang mengeposkan sedikit demi sedikit karya mereka ke dalam blog masing-
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 230
masing untuk dibaca oleh pengunjung. Cara sebegini sebenarnya memerlukan kesabaran dan
ingatan daripada pembaca.
Antara penulis atau pengarang Malaysia yang menggunakan kaedah ini ialah Nizam Zakaria
(nizamzakaria.blogspot.com). Beliau telah menghasilkan beberapa buah novel elektronik (e-
novel)dalam format PDFseperti Mat dan Met, Hadi, Cinta Nasi Lemak, Gurisan
Intaglio dan yang terbaharu dan masih dipaparkan sedikit demi sedikit ialah Kisah Seorang
Limau Nipis. Cara ini juga turut digunakan oleh Sri Diah dan rakan-rakannya dalam
menghasilkan e-novel berjudul Jangan Ada Dendam (novel2u.blogspot.com) serta
pengarang-pengarang muda yang baharutermasuk yang sedang menuntut di luar negara
seperti Rnysa dengan karya berjudul Relevankah Aku di Hatimu (radha.blogdrive.com),
Adielah dengan Mahar Asmara (adileah.blogdrive.com)Diya dengan karya Masihkah
Ada Cinta (juz4u.blogdrive.com) dan ramai lagi
Malah ada pengarang yang turut mengadakan perbincangan serta menawarkan forum di
samping mempromosikan karya-karya mereka kepada khalayak. Antaranya ialah Faisal
Tehrani (tehranifaisal.blogspot.com), Sri Diah (sridiah2u.blogspot.com), Nisah Haron
(annyss.blogspot.com), Anis Ayuni (anisayuni.blogdrive.com), dan Salina Ibrahim
(salinaibrahim.blogdrive.com). Antara penulis di Indonesia pula ialah Joko Pinorbo
(jokpin.blogspot.com), Eka Kuriawan (ekakurniawan.com), Pipiet Senja
(pipietsenja.multiply.com), Asma Nadia (anadia.multiply.com), dan Anrea Hirata
(sastrabelitong.multiply.com).
Di Malaysia, penulis boleh juga berkumpul di e-Sasterawan yang dikenali sebagai Taman
Perumahan Siber untuk penulis-penulis yang aktif dalam ruang siber. Di sini, penulis boleh
mewujudkan laman peribadi (yang dipanggil lot-lot karya) dan menyiarkan karya mereka
seperti cerpen, puisi, madah, haiku, drama, dan sebagainya. Malah, karya-karya ini ada yang
diterbitkan sendiri oleh pihak pengurusan e-Sasterawan dan dijual secara dalam talian di
Kedai eSastera. Selain itu, terdapat juga Penulisan2u, iaitu sebuah laman penulisan yang
memberi peluang kepada para penulis berkongsi idea dan menyiarkan karya mereka. Dengan
jalinan kerjasama yang dilakukan dengan pelbagai penerbit seperti Kaki Novel dan Fajar
Pakeer, banyak karya yang menarik di laman ini telah diterbitkan dalam bentuk bercetak.
3.4 Percetakan Digital
Teknologi ini membantu fleksibiliti dalam proses pengeluaran cetakan, membantu penciptaan
penerbitan tempatan, dan meningkatkan penerbitan berasaskan konsumer. Ia berhubungan
dengan rangkaian elektronik dan membuka jalan kepada percetakan atas permintaan dan juga
self-publishing, serta membolehkan konsumer membuat pesanan terhadap judul yang habis
dicetak. Dengan teknologi yang sama, penerbit dan penjual buku boleh memperoleh faedah
maksimun daripaada cetakan dalam jumlah yang kecil. Malah, teknologi ini juga boleh
digunakan oleh pengarang yang melakukan penerbitan sendiri (self-publishing) terhadap
karya mereka. Bagi Poynter (1984), self-publishing is where the author bypasses all the
middlemen, deals directly with the printer and then handles the marketing and distribution.
Walaupun percetakan digital menawarkan faedah yang banyak dalam banyak aplikasi seperti
kemampuannya menintegrasikan sistem dan mengoptimumkan aliran dalam proses
pengeluaran, pentadbiran dan komunikasi rangkaian, ia perlu bersaing dengan kaedah
produksi yang lain. Dalam industri yang didominasi dengan kos yang lebih rendah dalam
penggunaan percetakan offset, percetakan digital perlu berhadapan dengan persekitaran
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 231
ekonomi yang semakin mencabar, dan ini melibatkan pertimbangan utama, iaitu pelaburan
kewangan.
Percetakan atas permintaan atau lebih dikenali sebagai POD (print-on Demand) merupakan
kaedah baru dalam percetakan. Ia juga disebut percetakan digital. Ia ialah gabungan antara
penerbitan elektronik dengan penerbitan cetak yang memperlihatkan bahannya dipegang atau
disimpan oleh penerbit dalam bentuk elektronik dan dicetak dalam salinan keras (hard copy)
apabila mendapat pesanan (European Commission, Julai 2005). Teknologi ini melibatkan
sisten percetakan laser dan teks yang diformat secara elektronik yang boleh dibaca oleh
pencetak. Cara ini sebenarnya membebaskan penerbit daripada proses percetakan beribu-ribu
naskhah untuk sesebuah judul.
3.5 Penjualan Dalam Talian
Digitalisasi membolehkan syarikat penerbitan menggunakan saluran pengedaran elekronik
sebagai tambahan kepada cara tradisional dalam proses penjualan media bercetak seperti
surat kahabar, majalah, mahupun buku. Ini ditambah pula dengan adanya teknologi Internet,
web, dan perdagangan elektronikatau lebih dikenali sebagai e-dagangjuga menawarkan
peluang yang menarik dan membawa impak yang besar kepada penjual buku. Ini kerana
semakin ramai yang memasuki ruang maya untuk melakukan pembelian dalam talian. Oleh
sebab itu, hubungan yang rapat antara peniaga dengan pengguna atau pelanggan juga dapat
diwujudkan. Malah, ramai pakar pemasaran menganggapnya sebagai satu alat yang tidak
boleh diabaikan dan menjadi satu alternatif wajib untuk apa-apa jua jenis perniagaan yang
ingin ke peringkat antarabangsa.
Malah, pembelian dalam talian telah menjadi salah satu aktiviti yang semakin popular di
kalangan pengguna Internet. Dan salah satu perdagangan dalam talian yang amat popular
beberapa tahun kebelakangan ini ialah penjualan buku dalam talian. Asia menawarkan
pasaran yang luas kerana hampir 80 peratus pengguna Internet melakukan pembelian dalam
talian dengan membelanjakan lebih kurang US$3,000 sepanjang tahun 2008 menurut tinjauan
yang dilakukan oleh Visa (www.whatsonxiamen). Maka, Internet kini menjadi medium yang
hebat untuk pembelian dan penjualan buku kerana ia dianggap sebagai komoditi yang bagus
untuk Internet.
Ramai yang menganggap buku merupakan produk yang sesuaiselain perkakasan dan
perisian komputeruntuk dipasarkan terus melalui Internet kerana ciri-ciri semula jadi yang
dimilikinya seperti yang berikut: (a) buku merupakan komoditi yang dikenali dan diketahui
umum; (b) ia tidak mahal dan sering dibeli; (c) ia ditawarkan kepada semua orang dan semua
orang boleh menjadi pengguna yang berpotensi; dan (d) mudah diedarkan dan tidak
memerlukan pembungkusan yang rumit. Oleh sebab itu aktiviti pembelian buku dalam talian
semakin meningkat sejak kebelakangan ini. Dan kajian A.C. Nielsen pada 2008 menunjukkan
buku masih terus menjadi produk paling popular yang dibeli secara dalam talian dalam
kalangan penduduk di negara Asia, iaitu sebanyak 41 peratus.
Oleh sebab itu, terdapat semakin banyak kedai buku dalam talian, terutama setelah kejayaan
Amazon.com. Menurut Yesil (1997), kedai siber, kedai maya atau kedai virtual is a
storefront in cyberspace, a place where customers can shop from their home computer and
where merchants can offer merchandise and services for a fraction of the overhed required in
a physical storefront. Ia wujud pada bahagian Internet yang dikenali sebagai World Wide
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 232
Web. Laman storefront wujud untuk menjual sesuatu. Walau apa pun produknya, ia bertujuan
untuk melaksanakan transaksi perniagaan secara dalam talian (online). Kewujudannya
memberikan kelebihan kepada peniaga buku dan orang ramai. Antaranya adalah seperti yang
berikut: (i) menawarkan pilihan judul yang luas dan ruang pameran yang tidak terhad dengan
carian yang hebat; (ii) maklumat produk boleh sentiasa dikemas kini dan ditunjukkan dengan
cara yang interaktif; (iii) proses pesanan yang mudah dan pantas; (iv) penghantaran produk
yang pantas dan membolehkan pengguna melakukan komunikasi atau meminta kepastian
daripada peniaga; (v) memperoleh pelanggan dari pelbagai lokasi tanpa mengira geografi;
(vi) menawarkan harga yang kompetitif; dan (vii) pengaksesan berterusan tanpa mengira
masa dan tempat.
Oleh sebab itu kini, sudah semakin banyak kedai buku dalam talian yang wujud, termasuk di
Malaysia dan Indonesia seperti Kedai-buku.com, E-kedai.net, Kedai Buku Online, My Kedai
Buku, Bukabuku.com, Bookoopedia.com, Beli-buku.com, dan Rumahattar.com. Kedai buku
konvensional yang popular dalam kalangan peminat buku telah mula membangunkan kedai
maya untuk memberi keselesaan kepada orang ramai di samping cuba meluaskan pasaran
mereka. Antaranya ialah rangkaian kedai buku antarabangsa seperti OBuku, Popular
Bookstore, Kinokuniya, Page One, Arthurs Books, serta MPH Bookstore dan kedai-kedai
buku tempatan seperti Minerva, First Edition Bokstores, Dawama Sdn. Bhd., dan Koperasi
Buku Sdn. Bhd. Selain itu ada juga kedai buku dalam talian yang diwujudkan oleh penerbit
seperti Mybook.com (UPND), Bookcafe.com (PTS Publications), Pelangibooks.com
(Penerbitan Pelangi), Gramediaonline (Penerbit Gramedia), dan Erlangga (Penerbit
Erlangga).
Ada juga kedai buku dalam talian yang menawarkan pilihan judul daripada kategori-kategori
yang khusus. Cara ini sebenarnya memberi peluang kepada mereka untuk mencapai pasaran
tertentu (niche market) kerana setiap kategori buku mempunyai pengikutnya sendiri. Untuk
mendapatkan bahan bacaan yang sesuai untuk kanak-kanak misalnya, orang ramai boleh
mengunjungi MariBaca Childrens Bookstore, Ummiku Sayang.com manakala peminat buku
sastera boleh cuba melawati Ujana Ilmu. Mereka yang memerlukan buku rujukan sekolah
pula boleh mengunjungi Ebuku Bookstore dan buku berbahasa Cina di Mentor (Chinese)
Bookstore dan Star Bookstore. Peminat komik pula boleh mengunjungi Angelzon.com dan
Buku Dedo, manakala yang ingin mencari buku manual berkaitan kenderaan boleh ke
manualbookmobil.com.
Dengan adanya kedai buku dalam talian, ia sebenarnya menawarkan cara yang ekonomikal
untuk mencapai khalayak dan pasaran yang luas dengan masa yang pantas. Khalayak juga
mendapat pilihan judul yang lebih banyak berbanding jika mereka membeli di kedai-kedai
buku berhampiran kawasan mereka. Walaupun terdapat kedai bukuyang dikenali sebagai
superstoreyang menawarkan pilihan judul yang banyak, ia hanya boleh didapati di bandar-
bandar besar. Bagi mereka yang tidak mempunyai akses ke kedai buku seperti ini, Internet
menawarkan pilihan judul yang luas dengan hanya berada di hadapan komputer berinternet
dan mengeklik tetikus.
3.6 Laman Sosial
Sejak awal lagi teknologi rangkaian komputer dijangka membawa kesan sosial kerana ia
bukan sahaja menghubungkan komputer, tetapi juga manusia. Teknologi berkenaan terus
berkembang sehingga memenuhi keperluan minimum teknikal bagi mewujudkan komuniti
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 233
dalam talian yang efektif sehingga munculnya laman sosial yang dengan mudahnya
mewujudkan jaringan sosial dalam talian.
Pengenalan laman jaringan sosial seperti Facebook, Bebo, MySpace, Twitter, Friendster, dan
Cyworld berjaya menarik perhatian berjuta-juta pengguna sebagai salah satu alat jaringan
sosial dalam kehidupan harian mereka. Antara motivasi yang menggalakkan mereka
menggunakan laman sosial ini adalah disebabkan ciri-ciri yang dimilikinya sebagai alat
komunikasi, perkongsian maklumat, menyebarkan pengalaman dan aktiviti. Laman jaringan
sosial ini membolehkan komunikasi dalam kitaran hubungan yang lebih luas, di samping
percantuman pelbagai aktiviti yang berasingan daripada mesej e-mel, pembentukan laman
web, diari, album foto hingga kepada memuat turun dan memuat naik muzik dan video.
Boyd dan Ellison (2007) mendefinisikan laman jaringan sosial sebagai perkhidmatan
berasaskan web yang membolehkan individu melakukan perkara berikut: (i) membina profil
publik atau semipublik dalam sesuatu sistem; (ii) menyediakan senarai pengguna lain yang
berkongsi hubungan (share a connection); dan (iii) melihat dan merentasi senarai hubungan
mereka dan yang dilakukan oleh orang lain dalam sistem itu. Laman jaringan sosial ini
lazimnya mempunyai portal, forum, blog, dan galeri (biasanya galeri foto). Setiap elemen
yang digunakan oleh pengguna sesebuah laman jaringan sosial berhubungan antara satu sama
lain dan menyumbang ke arah terbentuknya satu komuniti.
Statistik daripada comScore pula menunjukkan daripada 1.1 bilion pengguna yang
mengakses Internet pada Mei 2009, 734.2 juta daripadanya, iaitu 65 peratus daripadanya,
melawat sekurang-kurangnya satu laman jaringan sosial. Di Malaysia, trend ke arah
komunikasi berbentuk jaringan boleh dilihat apabila semakin ramai yang menggunakannya.
Ini disokong dengan laporan comScore World Matrix yang menunjukkan kadar penembusan
jaringan sosial di Malaysia yang agak tinggi, iaitu 66.6 peratusberada di belakang
Singapura (74.3 peratus), dan Korea Selatan (68 peratus).
Menurut ahli pemasaran (www.slideshare.net), perbelanjaan pemasaran kini banyak tertumpu
pada periklanan dalam talian ke atas rangkaian sosial yang popular. Kebanyakan organisasi
perniagaan juga menjadikan kehadiran dalam laman jaringan sosial sebagai prioriti utama
mereka. Ini kerana laman-lama ini memberi fokus kepada pembinaan hubungan dan komuniti
dengan membolehkan orang ramai berkomunikasi di laman itu dan berinteraksi bersama-
sama berasarkan minat, aktiviti, keperluan perniagaan, dan sebagainya. Menurut Wellman et
al. (1996), jaringan sosial berbantukan komputer ini mampu mengekalkan ikatan sokongan
yang kuat di tempat kerja mahupun dalam komuniti.
Ia juga semakin banyak digunakan oleh pelaku-pelaku dalam industri penerbitan untuk
meluaskan jaringan hubungan sama ada dalam kalangan pelanggan, rakan niaga, mahupun
pasaran. Penerbit seperti Tintarona Publications, Utusan Publication, Ameens Books, PTS,
Alaf 21, dan Penerbit UTM, misalnya menggunakan Facebook untuk menyebarkan maklumat
tentang penerbitan mereka manakala pengarang seperti Sri Diah, A. Samad Said, Uthaya
Sankar menggunakannya untuk berkomunikasi dengan sahabat dan peminat masing-masing
di samping menghebahkan aktiviti semasa masing-masing.
4 Kesimpulan
Kemajuan teknologi mempermudah segala urusan dan mendekatkan jarak antara pihak yang
terlibat dalam industri penerbitan. Selain itu, ia sebenarnya memberi peluang kepada semua
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 234
pihak di kedua-dua negara, Indonesia dan Malaysia, untuk bekerjasama dan bersaing secara
sihat sesama sendiri di pasaran yang lebih luas. Dengan teknologi Internet, penerbit,
pengarang, dan pekedai buku dapat memahami keperluan orang ramai dengan mudah kerana
interaksi dan komunikasi dengan golongan ini dapat dilakukan dengan mudah dan segera.
Walaupun laporan kajian yang dilakukan e-Business Watch 2005 menunjukkan ICT,
terutama melibatkan Internet mempunyai risiko dan mendatangkan cabaran kepada pelaku
industri penerbitan, terutama penerbit, kerana melibatkan faktor kewangan dan tenaga kerja,
ia juga membuka peluang dalam meningkatkan perkhidmatan pelanggan dan menyokong
pembinaan jenama produk. ICT didapati mempunyai impak yang positif terhadap pasaran
penerbitan sainstifik dan pendidikan yang menyaksilan penyampaian dalam talian (misalnya
untuk perpustakaan) mengubah mekanisma pengedaran dan model langganan.
Semua pihak perlu mengambil kesempatan dan menggunakan laman web yang dibina sebagai
alat promosi dan saluran penjualan dalam usaha membaiki aspek pemasaran buku yang
sememangnya agak lemah di Asia Tenggara ini, termasuk Malaysia dan Indonesia. Malah,
dengan adanya jaringan sosial dalam talian seperti Facebook dan Twitter, ia sebenarnya
memberikan peluang kepada pelaku dalam industri penerbitan untuk meluaskan jaringan
mereka ke peringkat global untuk berkongsi maklumat dan menyebarluaskannya dan
seterusnya memperoleh maklum balas daripada lebih ramai pihak. Oleh itu, masalah buku
tidak dapat dijual atau terperap di gudang sebenarnya sedikit sebanyak dapat diatasi sekiranya
teknologi baharu ini dimanfaatkan sepenuhnya oleh semua pihak.
Rujukan
Adham Shadan. (2008). Novel telefon bimbit. Kosmo.
www.kosmo.com.my/kosmo/content.asp?y=2008&dt=0417&pub=Kosmo&sec=Infini
ti&pg=in_01.htm (diakses pada 30 Mac 2010).
Booming trade for online shopping in Asia Pacific. (2008).
www.whatsonxiamen.com/ent_msg.php?titleid=260 (diakses pada 26 September
2009)
Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and
scholarship. Journal of Computer-Mediated Communication, 13(1). Diakses pada 1
Mei 2009 dari jcmc.indiana.edu/vol14/issue1/boyd.ellison. html
European Commicion. (2005). ICT and electronic business in publishing and printing
Industry. E-Business watch. July.
www.attitudeweb.be/doc/resources/studies/ict_electronic_business_publishing_printin
g_industry.pdf (diakses pada 15 Mac 2010)
Kalmbach, J. R. (1997). The computer and the page: Publishing, technology & the
classroom. New Jersey: Ablex Publishing Corporation.
Kremer, J. (1998). 1001 ways to market your books. Edisi Kelima. Iowa: Open Horizon.
Laupa Junus & Khairunnisa Sulaiman. (2008). Buku elektronik gaya pembacaan baru.
Utusan Malaysia. 3 April.
Mizan luncurkan e-book pertama di Indonesia. (2001). Republika.
www.asmakmalaikat.com/go/buku/2001/09022001_3.htm. (diakses pada 26
September 2009)
Najibah A Bakar. (2008). Teknologi maklumat: Penerbitan web. Goodreads.
www.goodreads.com/story/show/41092.Teknologi_Maklumat?chapter=2 (diakses
pada 26 September 2009)
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 235
Online Shopping and Popularity in Asia. (2008). www.articlesbase.com/online-promotion-
articles/online-shopping-and-popularity-in-asia-689152.html (diakses pada 1 Oktober
2009)
Poynter, D. (1984). Self-Publishing Manual. California: Cara Publishing,
UNCTAD. (2002). Online publishing could revolutionize information production and
distribution in developing countries.
www.unctad.org/Templates/Webflyer.asp?docID=2925&intItemID=1584&lang=1
(diakses pada 26 September 2009)
Shum FB. (2003). Publish it yourself: Is self-publishing the option for you. Canada: Trafford
Publishing.
Siti Ezaleila Mustafa. (2002). Kedai buku dalam talian: Strategi baru dalam pemasaran buku.
Disertasi Sarjana Pengajian Media. Kuala Lumpur: Universiti Malaya.
Siti Ezaleila Mustafa. 2006. Pemasaran dalam perkembangan era teknologi maklumat dan
komunikasi. Dlm. Hamedi Mohd Adnan dan Rahman Shaari (ed.). Media di
Malaysia. Kuala Lumpur: Penerbit Universiti Malaya.
Stern, J. (1995). World wide web marketing: Integrating the Internet into your marketing
strategy. New York: John Wiley & Sons, Inc.
Vautier, E. (t.t). The Benefits of Social Networking. www.slideshare.net/ericavautier/an-
introduction-to-web-20-social-networking-for-small-businesses. (Diakases pada 30
Mac 2010)
Wellman, B. et al. (1996). Computer network as social network: Collaborative work,
telework, and virtual community. Annual Review of Sociology, 22. Diperoleh dari
Questia.com.
Yesil, M. (1997). Creating the virtual store: Taking your web site fom browsing to buying.
New York: John Wiley & Sons, Inc.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 236
SLICING ASPECT ORIENTED PROGRAM USING DEPENDENCE FLOW GRAPH
FOR MAINTENANCE PURPOSE
Syarbaini Ahmad, Abd Azim Abd Ghani,
Nor Fazlida Mohd Sani & Rodziah Atan
Faculty of Computer Science and Information System
University Putra Malaysia, Serdang
syarbaini@kuis.edu.my, azim@fsktm.upm.edu.my,
fazlida@fsktm.upm.edu.my, rodziah@fsktm.upm.edu.my
Abstract
Aspect-oriented programming (AOP) is new paradigm in programming that enables modular
implementations of cross-cutting concern such as synchronization, exception handling,
logging etc. which is producing a complex code in the program. Slicing is one of the
techniques that are useful for understanding and debugging the complexity of code that can
make maintenance activity easier. We propose a dependence flow graph (DFG) as a hybrid
algorithms that use control flow graph and data dependence graph as the intermediate
representation. Based on DFG, we show how to compute a static slicing of an aspect-oriented
(AO) code.
Keywords: Aspect-oriented, slicing, software maintenance, dependence graph, dependence
flow graph.
1. Introduction
Aspect-oriented (AO) is a post Object Oriented (OO) paradigm proposed by Kiczales et. al.
[1] with the goal of enhancing software maintainability through new modularization
mechanisms for encapsulating crosscutting concern. It is very useful in software engineering
to lead the reducing of complexity in the development cycle especially in the maintenance
phase. Separation of concerns [2] are able to identify, encapsulate and manipulate in isolated
way only those parts of software that are relevant to a concept, objective or intention given. It
is aimed [3] at breaking the hegemony of the dominant decomposition.
Slicing is a reverse engineering technique in software engineering to extract a part of codes
with respect to some special computation. It was first introduced by Weiser with the
procedural programming in 1979 [4]. Slicing was first developed to facilitate debugging, but
it is then found helpful in many aspects of the software development life cycle especially
software maintenance. Since the last two decades there are many types of slicing have been
presented [5] such as hybrid slicing, relevant slicing, union slicing etc. but the major focus of
research in slicing are static and dynamic slicing. Ishio [6] claim that because of the features
of aspect-oriented programming (AOP), debugging, testing, and verifying program can be
more complex than with the traditional programming technique. In this domain, slicing can
be more useful technique. It can be used to find the part of the program that affects the
criteria, or is affected by the criteria.
Dependence flow graph (DFG) is a combination of two types of graph which are dependence
graph (DG) and control flow graph (CFG). DG is a directed graph normally used to represent
dependencies of several objects towards each other. In OO [7], DG is a collection of method
dependence graph representing a main() method or a method in a class of the program, or
some additional arcs to represent direct or indirect dependencies between a call and the called
method and transitive interprocedural data dependencies. DG in AO used to represent the
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 237
dependencies between the concept of join points, advice, aspects and their associated
constructs. CFG is a model of node (or point) corresponds to a program statements, and each
arc (or directed edge) indicates the flow of control from one statement to another [8].
In this research, we propose an approach of static slicing of AO program. We, develop a
dependence flow graph to represent the data dependency and control flow of the program.
We extend the aspect-oriented dependence graph from Zhao [7] by separate the aspect code
and non-aspect code. After that, we show how to compute a static slice of AOP based on
aspect-oriented system dependence flow graph. Our main contribution is to produce
dependence flow graph of aspect-oriented software on which static slices of AOP can be
computed efficiently.
2. Problem Statement
Most people, in the absence of a better way, would search through the code and insert calls to
a logging method in appropriate places. If the system were well-designed and constructed, the
code might require changes in only a few places. For most systems, though, insertions would
be necessary in many places. If the system were object-oriented, we might build a logging
class and then use an instance of it to handle the logging. We might need a hierarchy of
classes to handle different files and databases. In AOP, cross-cutting concerns produce a list
of codes and classes expressed using standard language constructs because these concerns are
tangled with the basic functionality of the code. This gives rise to the increase of the system
complexity and difficulty of maintenance.
There are many researches focus in getting the best way to represent the architecture of
aspect code in order to understand the program. Some of them are using control flow graph,
data dependence graph, call graph etc. The control flow graph allows us to formulate a
simple algorithm, based on abstract interpretation, which finds possible-paths constants
without the need for program transformations. However, its asymptotic complexity is still
poor. There is a different problem when using dependence graph. Graphs inherit many of the
problems of the data dependence graph, for example, for constant propagation; we must still
perform the program transformation. Algorithms that use the various dependence graphs are
more complex, and none of them finds possible-paths constants without some program
transformation. However, the asymptotic complexity of these algorithms is a factor of V
better than the algorithm that use control flow graphs [22].
An ideal program representation for constant propagation would have a local execution
semantics from which an abstract interpretation can be easily derived. It would also be a
sparse representation of program dependencies, in order to yield an efficient algorithm. There
are some advantages and disadvantages of dependence graph and control flow graph. Why
not we mix the advantages of dependence graph and control flow graph and prove a better
solution to represent the architecture of aspect code. We view as a data structure that can be
traversed efficiently for dependence information, and it can also be viewed as a precisely
defined language with a local operational semantics.
3. Related Works
Program slicing is a decomposition technique that is very useful in software programming. It
help programmer to easily in debugging, testing and maintenance activity. Weiser [4] first
introduced it as executable static slicing. Static means that only statically available
information is use for computing [9]. It means that, slicing was only applicable on the source
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 238
code with no other information executed than the source code. Nowadays, a widely adopted
approach proposed by many authors in slicing, consist of static slicing, dynamic slicing and
hybrid slicing.
In software maintenance, Keith and Lyle [10] apply program slicing to the maintenance
problem by extending the notion of a program slice that originally required variables and line
numbers to a decomposition slice. It then captures all computation on a given variable. This
will help maintainer to manage the statements and variables, which may be modifying in the
component easily.
Akimura [11] evaluates whether program slicing is effective for actual program maintenance
by using some experiments. As results of the experiment, it confirms that program
maintenance can better be carried out with program slicing than without it. From this
research, we found that slicing can make maintenance activity become easier.
Program slicing was initially studied in procedural programming language. It then to cope
with object-oriented and now with aspect-oriented. In procedural, Arpad Beszedes [12)
introduce a new forward global method for computing backward dynamic slices of C
programs. In parallel to the program execution, the algorithm determines the dynamic slices
for any program instruction. This group of Researchers also proposes a solution for some
problems specific to the C language (such as pointers and function calls). The main
advantage of the algorithm is that it can be applied to real size C programs, because its
memory requirements are proportional to the number of different memory locations used by
the program (which is in most cases far smaller than the size of the execution historywhich
is, in fact, the absolute upper bound of our algorithm). They use dynamic slicing because they
claim that it can produce more precise computation results in several applications.
In object-oriented, Mohapatra [13] proposed a novel technique for computing dynamic slices
of distributed Java programs. The researchers introduced the notion of distributed program
dependence graph (DPDG) as the intermediate program representation used by distributed
dynamic slicing (DDS). The concept implemented in this research is base on marking and
unmarking the edges of the DPDG as and when the dependencies arise and cease at run-time.
The researchers also presented a dynamic slicing technique for JAVA programs and claim
that it also can be easily implement in other object-oriented program such as C++.
Zhang [14] proposed a method to slice concurrent object-oriented programs to reduce the
state space in the process of verifying program by using JAVA concurrency model. The
concept implemented is by defining dependences between statements in the given program,
and introduced multithreaded dependence graph (MtDG) as intermediate representation. The
job steps are; firstly, define the dependencies between statements in the given program. Then,
present the method of extracting slicing criterion from linear temporal logic property and
propose the steps of computing slicing.
In aspect-oriented, Zhao[7] was the first presented a dependence-based representation called
aspect-oriented system dependence graph (ASDG), which extends previous dependence
graphs, to represent aspect-oriented software. The ASDG of an aspect-oriented program
consists of three parts: a system dependence graph for non-aspect code, a group of
dependence graphs for aspect code, and some additional dependence arcs used to connect the
system dependence graph to the dependence graphs for aspect code. Then, Zhao used the
two-phase slicing algorithm proposed by Larson and Harrold [15] to compute static slice of
aspect-oriented programs.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 239
M. Sahu [16] proposed extended aspect-oriented system dependence graph (EASDG) as
intermediate representation, extension to the ASDG of Zhao. The EASDG of an aspect-
oriented program consists of a system dependence graph (SDG) for non-aspect code, a group
of dependence graphs for aspect code and some additional dependence edges used to connect
the system dependence graph for non-aspect code to the dependence graphs for aspect code.
EASDG is base on AspectJ language. As a dynamic slicing algorithm, this approach does not
create any additional nodes during run-time and did not use any trace file to store the
execution history.
Then, Mohapatra [17] proposed a dynamic slicing algorithm for aspect-oriented programs
used Dynamic Aspect-Oriented Dependence Graph (DADG). After comparing with ASDG of
Zhao they found that Zhaos SDG in computing static slice results is missing of some
statement. DADG is an arc-classified digraph which represents various dynamic dependences
between the statements of the aspect-oriented program. In support the DADG, a tool called
Dynamic Dependence Slicing Tool (DDST) is use to implement the algorithm called trace
File Based Dynamic Slicing (TBDS).
All of the research mentioned above are aspect-oriented slicing using dependence graph as a
code representation. Generally, there are many other research done to represent AO code.
some of them are control flow graphs [19][21], call graphs [18], flow graphs and flow tree
[20]. The choice of program representation in aspect-oriented as a research study, can be one
of the evidence that the growing complexity of optimizing and parallelizing compilers are
focus on intention of the programming language community.
In this proposal, we proposed dependence flow graphs as an intermediate representation.
Dependence flow graph is a parallel representation between dependence graph and data flow
model of computation. It was first known proposed by Pingali [22] implemented with
FORTRAN and in the data flow language ID into an intermediate language called Pidgin. As
in the data dependence graph, the dependence flow graph can be viewed as a data structure in
which arcs represent dependencies between operations. It is easy to verify that for every
dependence arc in the data dependence graph, there is a corresponding path in the
dependence flow graph. However, unlike data dependence graphs, dependence flow graphs
are executable, and the execution semantics, called dependence-driven execution, is a
generalization of the data-driven execution semantics of data flow graphs [22].
4. Objectives
This research is doing by refer to the target as below:
4.1 To propose a static slicing algorithm for aspect-oriented programs by using a
dependence flow graph as the intermediate representation.
4.2 To develop a prototype tool called Static Dependence Slicing Tools (SDST) to
implement the algorithm.
4.3 To test a prototype tool with aspect-oriented programs.
5. Methodology
In this research, we first develop a basic concepts and rules for slicing of aspect-oriented
programs to help maintainers in maintaining system developed. We first get the sample of
AspectJ program. We use AspectJ as a language because it is well known language
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 240
implemented in aspect-oriented. AspectJ is seamless aspect-oriented extension to Java. It can
be used cleanly to modularize the crosscutting structure of concerns such as exception
handling, synchronization and resources sharing that are usually difficult to express cleanly in
source code using existing programming techniques [7]. There are some concepts and
associated constructs to Java in AspectJ which are called join points, point cut, advice,
introduction and aspect.
From the sample of AspectJ program, we construct a dependence flow graph for aspect and
non-aspect code, based on algebraic approach to program dependencies [22]. We will identify
all the code by referring to the features of join points, point cut, advice, introduction and
aspect from sample code. The dependence flow graph can clearly view as a data structure that
can give dependence information and also can be view as precisely defined language with a
local operational semantics.
In this research study also will focus on the development of aspect-oriented prototype system
called Static Dependence Slicing Tools (SDST), in order to help maintainers in doing their
job. The aspect-oriented system maintenance tool will become a prototype of aspect-oriented
software system which is consisting of slice descriptions of software components and
interactions between components. We will use UML model in the development, start from
the first phase until complete the cycle.
Lastly, we will test the prototype system with some aspect-oriented codes. This is very
important to ensure that, by using dependence flow graph, we can easily represent the code as
a data structure that can be traversed efficiently for dependence information, and it can also
be viewed as a precisely defined language with a local operational semantics. In other word it
will help maintainer to easily understand the architecture of a program.
6. Conclusion
AOP is growing rapidly, and we see AOP applications in many areas such as middleware,
security, fault tolerance, quality of service, and operating systems. We are also beginning to
see AO applied at various stages of the software life cycle especially in maintenance phase
[23]. It is not yet a fully mature discipline and we are looking forward to seeing more AO
software development in research and applications. As maintenance is very important in
making system life more
References
1. G. Kiczales, et al. (1997). Aspect Oriented Programming. Proc. Of ECOOP97, LNCS
1241, Finland, 220-242.
2. G. Carlos, J.M. Murillo, Pablo A. Amaya (2004). Aspect Oriented Analysis: a MDA Based
Approac., Quercus Software Engineering Group, University of Extremadura Spain.
3. Elisa.Baniassad, Siobhan.Clarke (2004). Theme: An Approach for Aspect-Oriented
Analysis and Design. Trinity College, Dublin ICSE 2004.
4. Weiser, M. (1979). Program Slices: Formal, Psychological, and Practical Investigations
of an Automatic Program Abstraction Method. PHD Thesis, University of Michigan,
USA
5. Boewen Xu, J. Q. (2005). A Brief Survey of Program Slicing. Nanjing China: ACM
Sigsoft Software Engineering Notes.
6. Takashi Ishio, Shinji Kusumoto, Katsuro Inoue (2004). Debugging support for aspect-
oriented program based on program slicing and call graph. In ICSM 04: Proceedings of
the 20th IEEE International Conference on Software Maintenance, pages 178187,
Washington, DC, USA. IEEE Computer Society.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 241
7. Jianjun Zhao (2002). Slicing aspect-oriented software. In IWPC 02: Proceedings of the
10
th
International Workshop on Program Comprehension, page 251, Washington, DC,
USA,. IEEE Computer Society.
8. Norman E. Fenton (1997). Software Metrics: A Rigorous & Practical Approach. 2
nd
Edition, page 280, PWS publishing Company, Boston UK.
9. Boewen Xu, J. Q. (2005). A Brief Survey of Program Slicing. Nanjing China: ACM
Sigsoft Software Engineering Notes.
10. Lyle, K. B. (1991). Using Program Slicing In Software Maintenance. IEEE Transactions
On Software Engineering , vol. 17 pg 751-761.
11. Nishimatsu Akimura, K. S. (1999). An Experimental Evaluation of Program Slicing on
Software Maintenance Process. IEICE Transactions on Information and Systems, Pt.1
(Japanese Edition) , VOL.J82-D-1;NO.8;PAGE.1121-1123.
12. Arpad Beszedes, T. G. (2001). Dynamic Slicing Method for Maintenance of Large C
Programs. Proceedings of the Fifth European Conference on Software Maintenance and
Reengineering (CSMR'01) . IEEE .
13. Durga P. Mohapatra, R. K. (2006). Distributed Dynamic Slicing of JAVA Programs.
ScienceDirect , 1661-1678.
14. Zhang Guangquan, R. M. (2008). An Approach of Concurrent Object-oriented Program
Slicing Base on LTL Property. International Conference on Computer Science and
Software Engineering (pp. 650-653). IEEE Computer Society.
15. Larson, L.D. and Harrold, M.J. (1996). Slicing object-oriented software. Proceedings of
the 18
th
International Conference on Software Engineering, German.
16. Madhusmita Sahu, Durga Prasad Mohapatra (2007). A Node-Marking Technique for
Dynamic Slicing of Aspect-Oriented Programs. 10th International Conference On
Information Technology, IEEE, pp. 155-160.
17. Durga Prasad Mohapatra, Madhusmita Sahu Rajeev Kumar and Rajib Mall (2008).
Dynamic Slicing of Aspect-Oriented Programs. Informatica page 261-274.
18. D.Sereni, O.D.M. (2003). Static Analysis of Aspects. AOSD'03., ACM: Boston,
Massachusetts. p. 30-39.
19. Zhao, J.J. (2006). Control-Flow Analysis and Representation For Aspect-Oriented
Programs. QSIC'06, IEEE: Beijing. p. 38-48.
20. W.Xu, D.X. (2005). A Model Based Approach to Test Generation for Aspect-Oriented
Programs. WTAOP'05. ACM. p. 1-6.
21. Parizi, R.M. (2008). Control Flow Graph Embodiment of ASpect-Oriented Programs
(AOPs): Definitions, Algorithm, And Tools Support, in Faculty of Information
Technology and Computer Science. University Putra Malaysia: Serdang.
22. K.Pingali, M.Back, R.Johnson, M.Moudgill and P.Stodghill (2003). Dependence Flow
Graphs: An Algebraic Approach to Program Dependencies. Cornell University NY.
23. Tzilla Elrad, Robert E. Filman,and Atef Bader, Guest Editors (2001). Aspect Oriented
Programming. Vol. 44, No. 10, 28-32, ACM.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 242
IMPACT OF ONLINE SOCIAL NETWORK TOWARDS COMMUNICATION
EFFECTIVENESS IN EDUCATIONAL INSTITUTION:
A CASE STUDY OF UNISEL
Muhammad Fairuz Abd Rauf
1
, Marina Hassan
2
,
Siti Fatimah Omar
3
, Hema Subramaniam
4
Universiti Industri Selangor, Malaysia
1
mfairuz@unisel.edu.my,
2
marina@unisel.edu.my,
3
ctpatimah@unisel.edu.my,
4
hema@unisel.edu.my
Abstract
Online social network refers to channel that encourages members to share their interest with
other registered users. Rumours, information breakdown and misuse of communication
channel are some of the example of communication hazards in educational institution which
caused by online social network. This can lead to information misinterpretation, delaying in
work progress and negative effect on work performance. In order to identify these problems,
questionnaires have been distributed among academicians in Universiti Industri Selangor
(UNISEL). Few solutions have been proposed such as monitoring of e-mail server, blocking
social network website by implementing DNS server, increase security using third party
software and improve network architecture. This paper consists of six parts: Part one
describes briefly about social network and its examples; this is followed by description of
problem caused by online social network in the second part; Part three highlights the
methodology used in conducting this research; Results and analysis will be discussed in part
four and part five consists of conclusions and recommendations.
Keywords: Online social network, educational institution, communication, impact.
1. Introduction
Online social network (OSN), become popular medium for communication, interaction and
knowledge sharing on the internet. Nowadays, human tend to depend on OSN as main
communication infrastructure rather than conventional communication methods. Latest
survey reveals that more than 60% of global population, who use online, actively involve in
social network activities (Bauch & McGiboney, 2009). These figures show the importance of
OSN among the internet users nowadays. OSN such as Face book, MySpace, Friendster are
mainly developed in order to effectively communicate idea, share the common interest
among each other and also to spread the information among the members. These social
network sites have million of users who actively utilize this infrastructure. For instance Face
book alone adds 377,000 users every twenty four hours (Arrington, 2009). According to Face
book (2009), about 200 million people worldwide use that social networking site and 50% of
them log in daily(Zuckerberg, 2010). Most of industry uses OSN as a medium of
communication to interact with people in order to fulfil number of purpose such as work and
personal matter; this includes educational institution as well. Certain academician in higher
learning institution takes further steps by utilizing the OSN for the teaching and learning
purpose. This paper, investigate the purpose and the main usage of OSN in educational
institution among academicians.
1.1 OSN Features
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 243
Almost all of the OSN site provide users with authentication credential to ensure only the
authenticate user can view the page to interact with others. Most of OSN site, contain
personal detail of user and able to view others personal details as long as the social network
is established, e.g. share interest and/or activities (Schneider, Feldmann, Krishnamusrthy, &
Willinger, 2009). Most OSN site is web-based and provides means for users to interact over
the internet, such as e-mail and instant messaging. The main types of OSN site are those
which contain category places (such as former school-year or classmates), means to connect
with friends (usually with self-description pages) and a suggestion system linked to trust.
However, the commonality across the general approach of social networking sites is users can
upload a picture of them, create their 'profile' and can often be "friends" with other users
[5]
.
In most OSN site, both users must confirm that they are friends before they are linked. These
sites allow users to update their profile such as new photographs, hobbies, educational and
employments history and etc. Other than that, users can add new friend, approve other
friends request to be added into the network and to share/communicate information through
forum like features.
2. Problem Statement
OSN have been used widely these days by most people as a main communication medium
(B.A, 2007). Depends on usage, OSN can contribute to rise or downfall of a person and even
institution itself. This paper will focus on impact of online social network in educational
institution. Nowadays, students and academicians uses OSN in order to share ideas, advertise
any events and even doing online business. OSN works as a single spot to gather people
around the globe. Therefore any comments and feedbacks can be viewed by others within
seconds.
2.1 Misuse of OSN
Facebook, MySpace, Hotmail, Yahoo Messenger are some of the example of OSN that is
widely use especially in educational institution. Some of the things that can be done via OSN
are knowledge sharing, promotion or advertisement, find school colleagues, research and
even chatting (J & D, 2004). Based on observation in an educational institution, researcher
found out that most students and academicians use OSN to spread rumors, chatting with no
specific purpose in mind and advertise business which is non-related to academics (US
Department of Education, 2010). These are some of the issues which can have significant
impact to an educational institution (Usability Professionals' Association, 2010). By
spreading rumors, it can make or break academicians reputation. For instance, if a student
dislikes a lecturer for being too strict in terms of marking, the student can take extreme
measures by advertising or post negative comment about the lecturer. Automatically, the
lecturer reputation will be tarnished and this will have an impact on an educational institution
as well. Whenever students wish to enroll in an educational institution, this kind of unwanted
factor will play significant part in marketing an educational institution but in a wrong way.
2.2 Work Performance
Online community which is developed using OSN has long been touted as a great way for a
company to save money in its marketing, support, sales, and even product development. This
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 244
statement can become reality if OSN is used for constructive purposes. But some employees
dont realize that the misuse of these social networking site especially during office hour and
using companys resources is unethical behaviour. Users who are addicted so much with
OSN tend to loss focus on work and become negligent and ignore their daily duty or work.
Employee must realize that they are wasting companys resources (Cachia, 2008). According
to OSN participation report by Max and Mace, Figure 1 shows frequency of person using
OSN for personal reasons (H & M, 2008).
Figure 1: Frequency of user updating their personal details
3. Methodology
Main objective of the research is about identifying impact of online social network towards
communication effectiveness in educational institution specifically in UNISEL. Currently
UNISEL have over 10,000 students and over 500 academicians. UNISEL network
administrator does not block any OSN therefore encourage knowledge sharing among
academicians and students. Page such as Face book, MySpace and other email provider can
be viewed without any limitations in UNISEL. This research focused only on academician
and is carried out in order to ensure that most academician uses online social network wisely
and able to leave positive impact in order to ensure continuous growth of UNISEL. In this
case, methodology being used to collect data relies on observation techniques and
questionnaire.
3.1 Data Collection
Data will be collected via series of method from different individual among UNISEL
academician. Data is derived from observation and questionnaires. Participants were
informed that they were taking part in a simple research activity designed to assess the main
purpose they used OSN. Participants were first asked whether they are computer literate, to
ensure they will be able to understand basic concept of online social network. Next, each
participant has to answer questionnaire related to the research.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 245
4. Result and Analysis
OSN is being used with many purposes in mind. The purpose of using it differs from one
person to another. In this survey few purpose that relates to OSN usage were listed and the
questionnaire is distributed among academician in UNISEL. Based on analysis, most
academicians use OSN for the purpose of advertisement. 15.81% of respondent use OSN for
the advertisement purpose compare to 9.83 percent of respondent uses it for knowledge
retrieval purpose. Most of the academician uses OSN as medium to advertise / promote
UNISEL to users who are in their social network. Indirectly this will help UNISEL in terms
of student intake. Total respondents are 150 academicians from various faculties in UNISEL.
Most academicians did not use OSN for the purpose of research or related to academic. Only
11.75 percent of respondent uses OSN for research purposes. This study also focuses on how
frequent academician communicates with certain group of user categories. Through this
survey, most academician uses online social network to communicate with friends and
families. Figure 2 shows the actual statistics:
Figure 2: Communication Frequency using OSN
This proves that academician uses online social network for other purposes and not related to
academic. About 42 percent of academician in UNISEL communicates with friends and
families rather than students and industries personnel. This is contradicting to UNISELs
vision to focus on building relationships with other organizations and developing E-Learning
so that students can communicate with academicians effectively.
Figure 3: Preferred method for communication
23.45%
19.05%
22.47%
18.24%
16.78%
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
Friends Families Peers Students Industries
Personnel
P
e
r
c
e
n
t
a
g
e
(
%
)
Category
Communication Frequency using OSN
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 246
Figure 3 shows the result of academicians prefers to interact with people either face to face or
through OSN. 90.24 percent of the academicians prefer to use OSN to interact with people
compare to only 9.76 percent of respondent prefer face to face communication. From this
result, most of the academicians prefer to use online social network as a medium for
communication with people rather than face to face. There are pro and cons to this outcome,
for example, the information is not accurate or properly explains to the respective people.
But, online social network is the fastest medium of communication. So, as an academician,
respondents should use this medium appropriately and ethically to achieve purpose that
related to educational institution. Results from the survey shows that academician is keen to
use online social network for their daily job routine. Most of the respondent agreed that this
social network is effective to use (73.7 percent) and efficient (56.75 percent) in helping them
doing their job done. However, based on the survey, it shows that this result really contradicts
with the purpose of using online social network. Most of the academician using online social
network for the purpose of advertisement (15.81 percent) and business (15.17 percent) rather
than research (11.75 percent) and knowledge (9.83 percent), which this suppose to be the
priority purpose for academician. Through the survey also, it shows that most of the
academician is keen to communicate more with their friends (23.45 percent) rather than their
own students (18.24 percent). From this result based on survey, writer can conclude that
academician agreed that online social network is effective and efficient to be use in this
industry but they actually misused the facilities provided to them.
5. Conclusions and Recommendations
Based on findings, it is believed that the idea of promoting open communication among
students and lecturers is highly appreciated. However, certain boundaries should be placed in
order to ensure that each academician follows certain regulations set by educational
institution. Few solutions have been proposed such as monitoring of e-mail server, blocking
social network website by implementing DNS server, increase security using third party
software and improve network architecture. Monitoring e-mail server is one of the major step
taken by other multi national organizations in order to control spreading of rumours and
selling confidential information. This can be applied to educational institution as well.
Another method of controlling communication especially involving academician is to block
social network website by implementing DNS server. This is to ensure that academician will
only use the right OSN to communicate rather than wasting time chatting and sharing
personal information which is non-academic related. Increase security using third party
software can avoid any attempt to bypass firewall that is provided by the administrator.
Improve network architecture is the biggest step in promoting positive communication among
academicians. This can ensure that emails can be send without any interventions. Finally, in
order to encourage positive impact of OSN in educational institution, academicians must
realize their responsibility and utilize OSN the best way possible to encourage growth
educational institution.
References
Arrington, M. (2009, January). TechCrunch. Retrieved February 2010, from Facebook now
nearly twice the size of myspace worldwide: http://www.techcrunch.com/
B.A, W. (2007). Social Network marketing: ad spending and usage. Emarketer Report.
Bauch, S., & McGiboney, M. (2009). Social Network & Blogs now 4th Popular Online
Activity. New York: The Nielsen Company.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 247
Cachia, R. (2008). Social Computing: Study on the use and impact of online social
networking. Spain: JRC European Commission.
H, M., & M, M. (2008). Online Communities and their impact on business: Ignore at your
Peril. Rubicon Consulting, Inc.
J, D., & D, B. (2004). Public display of connection. BT Technology Journal , 22(4).
Maki. (2010). www.doshdosh.com. Retrieved February 2010, from
http://www.doshdosh.com/social-media-networking-and-roi/:
http://www.doshdosh.com/social-media-networking-and-roi/
Schneider, F., Feldmann, A., Krishnamusrthy, B., & Willinger, W. (2009). Understanding
online social network usage from a network perpective. 9th ACM SIGCOMM (pp. 35-
48). Chicago, Illinois, USA: ACM.
US Department of Education. (2010). www2.ed.gov. Retrieved February 2010, from
http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html:
http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html
Usability Professionals' Association. (2010). www.upassoc.org. Retrieved February 2010,
from http://www.upassoc.org/about_upa/leadership/code_of_conduct.html:
http://www.upassoc.org/about_upa/leadership/code_of_conduct.html
Zuckerberg, M. (2010). Facebook Statistics. Retrieved February 2010, from
http://www.facebook.com/press/info.php?timeline
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 248
E-KERAJAAN : ANALISIS KONSEP DAN PELAKSANAAN DI MALAYSIA
Norshita Mat Nayan, Halimah Badioze Zaman, Tengku Mohammad Tengku Sembuk
Fakulti Teknologi dan Sains Maklumat, Universiti Malaya
norshita_nayan@yahoo.com,
Fakulti Teknologi dan Sains Maklumat, Universiti Kebangsaan Malaysia
hbz@ftsm.ukm.my, tmts@ftsm.ukm.my
Abstrak
Pelaksanaan e-kerajaan dalam sektor perkhidmatan awam dipercayai dapat menambah baik
mutu perkhidmatan awam agar lebih sempurna dan berkesan. Di samping itu, ia juga dilihat
dapat mewujudkan satu saluran baru bagi meningkatkan penyertaan secara langsung rakyat
dalam penggubalan dasar-dasar awam selaras dengan harapan pendukung sistem demokrasi
yang berpaksikan kepentingan rakyat. Oleh hal demikian, e-kerajaan dianggap sebagai
langkah pertama untuk memperkukuhkan pembentukan masyarakat madani (civil society)
melalui ICT. Justeru itu, makalah ini akan cuba menganalisis makna konsep kerajaan
elektronik, aplikasi yang terlibat dalam e-kerajaan serta perlaksanaannya di dalam
masyarakat. Walaupun konsep aplikasi e-kerajaan ini masih di peringkat awal penerimaan
rakyat Malaysia, namun perlaksanaannya dapat dihuraikan dengan jelas. Beberapa sistem di
bawah e-kerajaan yang melibatkan pengguna pelbagai peringkat akan dibahaskan. Selain itu,
kertas kerja ini juga akan melihat secara mendalam fungsi sistem yang berada di bawah
flagship kerajaan Malaysia, peranan dan kepentingan serta penilaian pengguna umum dan
pengguna dalaman kerajaan elektronik dalam membantu membaik pulih perkhidmatan
kerajaan kepada masyarakat. Masyarakat kini bukan sahaja mendambakan perkhidmatan
yang berkesan dan mudah, malahan lebih cepat dan pintar dalam segala urusan. Kehendak
kepada kemajuan yang memerlukan transaksi dilakukan di hujung jari tanpa pembaziran
masa dan tenaga merupakan permintaan utama masyarakat dan ini mungkin dapat
direalisasikan oleh pembangunan sistem di bawah kerajaan elektronik.
Kata kunci: E-kerajaan, Malaysia, Masyarakat madani, Flagship, Transaksi
1. Pengenalan
Ke arah menuju sebuah negara maju, masyarakat kini memerlukan satu perkhidmatan yang
berkesan, cepat, serta mudah. Segala urusan harian perlu dilaksanakan dalam konteks yang
lebih efektif berkonsepkan maklumat di hujung jari. Semua ini boleh direalisasikan dengan
satu mekanisme iaitu kerajaan elektronik. Kerajaan elektronik merupakan satu perancangan
untuk menuju ke arah negara maju yang berkonsepkan sistem pengurusan yang berinformasi
sejajar dengan pembentukan dan objektif Wawasan 2020 yang telah dilancarkan pada bulan
Ogos tahun 1996. Pembinaan sebuah negara maju akan menjadikan teknologi maklumat
(ICT) sebagai salah satu nadi pembangunannya. Justeru, pelancaran projek mega negara
seperti Koridor Raya Multimedia (MSC) pada tahun 1996 telah dijadikan batu loncatan bagi
merealisasikan impian melahirkan sebuah negara dan masyarakat yang bermaklumat. Antara
misi utama pelancaran MSC ini adalah pembangunan kerajaan elektronik. Selain daripada itu,
objektif utama MSC juga adalah untuk mencapai Wawasan 2020 dengan merancang
pertumbuhan produktiviti. Untuk melonjakkan negara Malaysia sebagai pemimpin dalam era
maklumat dengan menarik dan membangunkan syarikat bertaraf dunia melalui perkongsian
pintar (smart partnerships). Selain daripada itu objektif MSC yang lain juga adalah untuk
membangunkan jabatan global di antara Malaysia dan bandaraya pintar bagi kepentingan
bersama atau dalam istilah lain adalah global bridges. Dalam gagasan aplikasi perdana MSC
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 249
merangkumi aplikasi kad pintar pelbagai guna, sekolah bestari, tele perubatan, pembangunan
keusahawanan dan juga sudah pasti termasuk pembangunan aplikasi kerajaan elektronik
seperti yang diringkaskan dalam jadual di bawah:
Jadual 1: Aplikasi Perdana MSC
APLIKASI PENERANGAN
Kad pelbagai guna Dikenali sebagai mykad, berfungsi:
o Kad pengenalan
o Lesen memandu
o Maklumat
o Maklumat kesihatan
o Touch N Go
o MEPS
o ATM
Sekolah bestari Kemudahan internet, makmal
komputer dan kurikulum baru bagi
pembangunan aplikasi pembelajaran
Teleperubatan Perkhidmatan maya untuk pesakit
Pembangunan keusahawanan Pembangunan IKS, menawarkan
khidmat nasihat, bantuan kewangan,
infrastruktur dan pasaran
Kerajaan elektronik Jabatan kerajaan akan berfungsi
secara atas talian.
Sumber: MAMPU
Oleh itu, makalah ini akan membincangkan tentang aplikasi kerajaan elektronik di bahagian
dua dan fungsi aplikasi tersebut serta penggunaannya di bahagian seterusnya. Penilaian
kepada aplikasi kerajaan elektronik yang dibangunkan dan digunakan oleh pengguna akan
dibincangkan di bahagian empat dan kesimpulan kepada kajian ini di akhir perbincangan.
2. Kerajaan elektronik
Penawaran perkhidmatan yang baik dan berkesan sentiasa dituntut oleh masyarakat yang
terdedah dengan arus globalisasi. Kerajaan sentiasa berusaha untuk memenuhi permintaan
dan memperkenalkan kaedah baru atau memperbaiki mekanisme yang sedia ada dalam
memberikan perkhidmatan yang terbaik. Kepentingan sistem penyampaian dasar yang
berkesan telah menarik perhatian kerajaan dan merupakan salah satu strategi utama dalam
merangsang ekonomi negara. Mengikut definisi Jaeger, P.T dan Thompson, K.M. 2003,
kerajaan elektronik atau electronic government (EG) ditakrifkan sebagai pengguna sistem
maklumat dan penggunaan teknologi untuk mengambil alih tugasan manual. Kerajaan
elektronik juga melibatkan hubungan di antara kerajaan dengan kerajaan, kerajaan dengan
masyarakat dan kerajaan dengan perniagaan (Mary Maureen Brown. 2003). Selain daripada
itu, mengikut definisi laporan Pertubuhan Bangsa Bersatu menyatakan kerajaan elektronik
adalah penggunaan Internet dan jaringan sedunia untuk penghantaran maklumat dan
perkhidmatan kerajaan kepada rakyat. Definisi yang lebih umum kerajaan elektronik adalah
penghantaran dan pentadbiran produk kerajaan melalui infrastruktur teknologi maklumat
(Mohd Abkari dan Mokhtar, 2006). Komponen yang terlibat dalam EG mengikut definisi
tersebut adalah pemaju, produk dan juga pengguna EG. Dalam proses pelaksanaan EG
kerajaan telah mempunyai visi terhadap sasaran yang perlu dicapai, pihak yang terlibat dan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 250
langkah-langkah yang perlu diambil. Kesemua ini merupakan rangka kerja utama EG. Seperti
yang telah dinyatakan di atas EG melibatkan 3 komuniti utama iaitu kerajaan, perniagaan dan
masyarakat atau dalam erti kata lain hubungan antara komponen G2G (government to
government), G2B (government to business) dan G2C (government to citizen). Pembangunan
EG adalah melalui pemberian sumber (outsourcing) kepada pihak swasta dengan pemantauan
dan pelaksanaan oleh pihak kerajaan. Pendekatan pelaksanaan EG adalah pendekatan
bersepadu dalam melaksanakan program secara besar-besaran. Kaedah pemberian projek EG
juga adalah berdasarkan tender dan sebut harga, pembukaan kertas cadangan(RFP) dan juga
konsep permintaan cadangan (CRFP) (Mohd Abkari dan Mokhtar, 2006). Kerajaan elektronik
adalah satu projek yang berpandangan jauh yang bertujuan untuk mencorakkan pentadbiran
kerajaan melalui kaedah aplikasi teknologi maklumat atas talian. Di peringkat awal EG hanya
7 aplikasi yang terlibat sebagai peneraju utama iaitu Persekitaran Pejabat generik (GOE),
Sistem Pemantauan Projek (PMS), E-Perolehan(EP), E-Khidmat dan Sistem Maklumat
Pengurusan Sumber Manusia (HRMIS), Bursa Buruh Elektronik (ELX) dan juga E-Syariah.
Daripada 7 aplikasi tersebut 3 aplikasi khusus untuk kegunaan sektor kerajaan iaitu GOE,
HRMIS dan PMS. ELX disasarkan untuk perniagaan dan rakyat, E-syariah untuk semua
kumpulan, E-service untuk masyarakat dan EP untuk perniagaan. Kesemua aplikasi dan
fungsi sistem tersebut akan dibincangkan di bahagian seterusnya.
3. Aplikasi dan fungsi sistem kerajaan elektronik
Projek kerajaan elektronik bermula apabila kerajaan melancarkan Koridor Raya Multimedia.
Dalam tempoh 10 tahun dari pelancaran pelbagai perubahan dapat dilihat dalam jabatan dan
agensi kerajaan terutama yang melibatkan perkhidmatan kaunter dan orang ramai. Sehingga
kini penambahbaikan terus dijalankan sejajar dengan keperluan semasa yang menuntut
kepada kecepatan dan kepantasan masa. EG dibangunkan untuk mengubah cara operasi
dalam kerajaan dan kaedah untuk menyalurkan perkhidmatan elektronik kepada rakyat. EG
dibangunkan mengikut fasa yang telah ditetapkan. Dalam fasa 1, tumpuan diberi kepada
proses dalaman agensi dengan tujuan untuk melicinkan dan meningkatkan keupayaan.
Kecekapan dan keberkesanan agensi dalam menyediakan perkhidmatan. Fasa yang ke-2 ada
penumpuan terhadap usaha untuk meningkatkan pencapaian kepada perkhidmatan yang
ditawarkan oleh agensi kerajaan kepada orang ramai serta ahli perniagaan melalui pelbagai
saluran elektronik (Ismail Hashim, 1998).
Apabila kerajaan melancarkan projek MSC, secara tidak langsung negara akan didedahkan
dengan penggunaan teknologi maklumat dan multimedia dalam kebanyakan urusan
khususnya dalam projek kerajaan elektronik. Unit Pemodenan Tadbiran dan Perancangan
Pengurusan Malaysia (MAMPU) adalah perbadanan yang dipertanggungjawabkan mengetuai
dan memastikan perlaksanaan projek ICT negara berjalan dengan lancar. Konsep kerajaan
elektronik bertujuan untuk memudahkan pengurusan di samping dapat menambah baik
hubungan dan keselesaan di antara kerajaan, masyarakat dan perniagaan. Ini akan dapat
menjadikan aliran maklumat dapat diperbaiki bagi meningkatkan kualiti pembangunan,
penyelarasan dan perlaksanaan polisi kerajaan. Antara objektif utama kerajaan elektronik
adalah untuk mendefinisikan semula hubungan antara kerajaan, rakyat dan entiti perniagaan
(Mohd Rais Abdul Karim dan Nazariah Mohd Khalid, 2003). Oleh itu dengan perlaksanaan
projek kerajaan elektronik ini akan dapat membantu rakyat mendapat akses yang lebih
meluas, selesa dan berkualiti pada harga yang lebih baik terhadap perkhidmatan kerajaan.
Begitu juga dengan sektor swasta, di mana ia dapat meningkatkan perhubungan dan kepekaan
terhadap sesuatu prosedur atau polisi di samping memudahkan lagi proses permohonan dan
kelulusan. Objektif yang kedua pula adalah sebagai pemangkin kepada pembangunan MSC
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 251
melalui kerjasama yang lebih baik di antara sektor awam dan swasta (Mohd Rais Abdul
Karim dan Nazariah Mohd Khalid, 2003). Ini bermaksud kerajaan perlu membuat analisa
terhadap semua aspek sama ada dari segi penawaran perkhidmatan secara elektronik
mahupun dari segi permintaan terhadap perkhidmatan tersebut dan juga penilaian terhadap
penerimaan rakyat terhadap aspirasi ini. Slogan utama untuk menjadikan Malaysia sebagai
kerajaan elektronik adalah cepat, mudah dan selesa dalam melicinkan sistem penyampaian
kepada rakyat. Terdapat 7 aplikasi utama yang dibangunkan dalam projek e-kerajaan sebagai
projek perintis iaitu Persekitaran Pejabat Generik (GOE), Sistem Pemantauan Projek (PMS),
E-Perolehan(EP), E-Khidmat dan Sistem Maklumat Pengurusan Sumber Manusia (HRMIS),
Bursa Buruh Elektronik (ELX) dan juga E-Syariah dihuraikan seperti di bawah:
3.1 Persekitaran Pejabat Generik (GOE)
GOE merupakan satu sistem aplikasi yang berupaya membantu agensi kerajaan menguruskan
dokumen dengan lebih efektif. Urusan-urusan berkenaan akan dikendalikan secara elektronik,
beroperasi tanpa kertas dan berlandaskan komunikasi pantas. Antara fungsi sistem GOE
adalah:
a) penyediaan dan penyimpanan dokumen dengan lebih berkesan
b) carian dan capaian dokumen dengan lebih cepat
c) penggunaan dan perkongsian maklumat yang lebih efektif dan produktif
d) setiap dokumen dikesan dan diuruskan dengan selamat
3.2 Sistem Pemantauan Projek (PMS)
Sistem ini berperanan menyediakan satu mekanisme bagi membantu kementerian serta agensi
di bawahnya untuk membuat pemantauan projek yang dibiayai oleh kerajaan. Sistem ini telah
dilaksanakan kepada semua kementerian dan agensi kerajaan di seluruh negara hingga ke
peringkat daerah. Sistem ini mempunyai pangkalan maklumat yang boleh membantu dalam
penyediaan laporan dan proses membuat keputusan dengan sepat dan tepat. Antara funsi
PMS adalah:
a) mengesan dan memantau aliran kewangan projek yang diluluskan
b) membantu dalam proses merancang dan proses membuat keputusan dengan cepat
c) membuat analisis status pelaksanaan projek dan membuat jangkaan isu yang
mungkin akan timbul
d) mengurangkan tugas-tugas manual seperti mengisi borang, mengemas kini rekod,
menghantar dokumen, mencetak dan sebagainya
e) mempercepatkan kerja dan mengurangkan kegunaan kertas serta meningkatkan
kemahiran IT
3.3 E-Perolehan(EP)
Merupakan satu sistem perolehan elektronik yang membolehkan pembekal menawarkan
barangan dan perkhidmatan kepada kerajaan melalui Internet. Ia merupakan satu sistem
elektronik yang menghubungkan komuniti pembeli kerajaan dan penjual bersama-sama
dalam persekitaran yang selamat dan terjamin. EP juga membolehkan para pembekal
mendaftar dan memperbaharui pendaftaran mereka dengan Kementerian Kewangan menerusi
Internet.
3.4 E-Khidmat
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 252
E-khidmat adalah satu aplikasi yang dibangunkan bertujuan memudahkan orang ramai untuk
berurusan dengan kerajaan melalui saluran elektronik termasuk kiosk, telefon dan Internet.
Pada masa kini e-khidmat menawarkan perkhidmatan seperti berikut:
a) Jabatan Pengangkutan Jalan (JPJ)
i. bayaran saman dan perkhidmatan maklumat
ii. perkhidmatan maklumat KEJARA
iii. tempahan ujian teori komputer
iv. pengeluaran lesen belajar memandu
v. pembaharuan lesen memandu
vi. pengeluaran notis bercetak tamat tempoh lesen memandu
b) Polis Diraja Malaysia (PDRM) - Bayaran saman dan perkhidmatan maklumat
c) Tenaga Nasional Berhad (TNB) - Bayaran bil elektrik dan perkhidmatan maklumat
d) Telekom Malaysia Berhad (TM) bayaran bil dan perkhidmatan maklumat
e) Dewan Bandaraya Kuala Lumpur (DBKL) bayaran cukai taksiran dan kompaun
f) Jabatan Insolvensi carian status bankrap individu dan penggulungan syarikat
3.5 Sistem Maklumat Pengurusan Sumber Manusia (HRMIS)
HRMIS merupakan satu aplikasi yang dibangunkan bertujuan untuk memastikan pengurusan
sumber manusia dalam perkhidmatan awam dapat menghasilkan kerja yang mahir, terlatih
dan bermotivasi untuk menghadapi cabaran semasa terutama dalam merealisasikan ekonomi
berasakan ilmu (k-ekonomi). HRMIS mengandungi 14 model pengurusan sumber manusia
yang bersepadu iaitu:
a) pengurusan rekod peribadi
b) data perjawatan
c) perolehan sumber manusia
d) pengurusan prestasi dan kerjaya
e) penilaian kompetensi
f) pembangunan sumber manusia
g) pengurusan komunikasi dan tatatertib
h) penamatan perkhidmatan
i) pengurusan saraan, faedah dan ganjaran
j) formulasi dan penilaian strategi
k) pangkalan ilmu, penerbitan web dan direktori kerajaan
3.6 Bursa Buruh Elektronik (ELX)
ELX adalah satu sistem yang dikawalselia oleh Kementerian Sumber Manusia. Ia merupakan
pusat pengumpulan maklumat pasaran buruh bagi membolehkan majikan dan pencari kerja
berhubung menggunakan platform yang sama. ELX bertujuan untuk mengadakan proses
pemadanan peluang pekerjaan di antara majikan dan pekerja secara menyeluruh. Selain
daripada itu ia juga bertujuan untuk membantu dan menjaga kepentingan majikan dan pekerja
dalam arus pembangunan negara. Majikan yang mendaftar dengan sistem ELX dapat
menyenaraikan semua peluang pekerjaan yang diperlukan dan pencari kerja yang mendaftar
juga boleh mendapatkan peluang mengetahui semua peluang pekerjaan yang ditawarkan.
ELX juga menawarkan Sistem Penempatan Orang Kurang Upaya (SPOKU) dan dibuka
kepada semua majikan dan orang awam. Pendaftaran boleh dibuat menggunakan sistem atas
talian dan pengguna akan menikmati semua perkhidmatan yang ditawarkan.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 253
3.7 E-Syariah
E-Syariah merupakan satu sistem yang dibangunkan untuk menguruskan sistem pentadbiran
institusi kehakiman Islam di semua negeri. Projek ini siap dibangunkan pada tahun 2006
dengan pelancaran aplikasi terakhirnya Sistem Pendaftaran Peguam Syarie (SPPS). Aplikasi
e-syariah menawarkan maklumat di mana orang ramai boleh capai di portal e-syariah. Portal
ini menyediakan kemudahan kepada orang ramai untuk membuat pendaftaran kes tanpa perlu
ke mahkamah. Ia juga dapat mempercepatkan proses pendaftaran di kaunter mahkamah selain
memudahkan orang ramai membuat pendaftaran kes. Antara kemudahan lain menerusi portal
e-syariah ialah:
a) pengiraan faraid
b) rujukan enakmen dan ordinan negeri
c) semakan kes dalam talian
d) pendaftaran dan pembaharuan sijil peguam syarie
e) pra pendaftaran kes jenayah
4. Penilaian e-kerajaan
Penilaian terhadap e-kerajaan telah dibuat dengan pengedaran soalan kaji selidik kepada 70
orang responden. 35 orang mewakili pengguna dalaman sistem e-kerajaan, iaitu pengguna
atau kakitangan kerajaan (internal user) yang terlibat secara langsung dengan aplikasi
tersebut dan 35 orang lagi adalah pengguna umum (public user) iaitu masyarakat yang
terlibat sebagai pengguna (end user) kepada aplikasi e-kerajaan yang dibangunkan. Penilaian
adalah menggunakan aplikasi SPSS versi 16 dengan mengambil kira nilai min pada setiap
konstruksi soalan kaji selidik dan juga nilai faktor analisis. 70 orang responden telah diambil
dalam kajian pilot di mana mewakili 10% daripada data dalam kajian sebenar yang akan
dijalankan iaitu 700 responden [8], di mana diwakili oleh 350 responden pada setiap
kumpulan iaitu kumpulan pengguna umum (public user) dan juga pengguna dalaman
(internal user).
4.1 Kebolehpercayaan instrumen
Kebolehpercayaan instrumen adalah satu nilai ukuran untuk menentukan ketekalan skor
setiap item (William, 2000). Tujuan kajian rintis dibuat adalah untuk mendapatkan ketelusan
data dari ujian percubaan melalui kumpulan kecil individu (Walter R., 1979). Tujuan lain
adalah untuk menilai ketekalan (realibility) item dari aspek aras item, objektif item,
kefahaman item, kebolehgunaan item dan arahan item itu sendiri (Gale H. Roid, 1982).
Kaedah yang digunakan untuk menguji darjah kebolehpercayaan item adalah dengan
menggunakan Internal consistency - prosedur Cronbach Alpha. Dalam kaedah penyelidikan
sains sosial pentafsir pekali kebolehpercayaan yang boleh diterima adalah melebihi = 0.6
(Mohd Zaimi Abdul Majid dan Mc Affer, 1997). Jadual di bawah menunjukkan nilai
Cronbach Alpha pada setiap konstruksi soalan kaji selidik:
Jadual 2: Nilai Cronbach Alpha untuk pengguna dalaman
Bahagian Konstruk Nilai Cronbach Alpha
A)1-5 Kepuasan pengguna 0.92
B)1-8 Kualiti sistem 0.91
C)1-10 Kualiti maklumat 0.96
D)1-5 Kegunaan sistem 0.94
E)1-11 Kualiti perkhidmatan 0.93
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 254
F)1-19 Konteks organisasi 0.98
G)1-12 Proses pembangunan sistem 0.94
H)1-11 Konteks teknikal sistem 0.95
Jadual 3: Nilai Cronbach Alpha untuk pengguna umum
Bahagian Konstruk Nilai Cronbach Alpha
A)1-5 Kepuasan pengguna 0.90
B)1-8 Kualiti sistem 0.96
C)1-10 Kualiti maklumat 0.97
D)1-5 Kegunaan sistem 0.91
E)1- 8 Kualiti perkhidmatan 0.93
4.2 Nilai min
Untuk mengetahui hubungan dan penerima terhadap nilai pembolehubah dalam soalan
kaji selidik ini maka nilai min diambil kira seperti yang ditunjukkan dalam jadual di
bawah:
Jadual 4: Nilai min pengguna dalaman
Penilaian Bil Item Purata Nilai Min
Kepuasan pengguna 5 4.57
Kualiti sistem 8 4.60
Kualiti maklumat 10 4.44
Kegunaan sistem 5 4.71
Kualiti perkhidmatan 11 4.30
Konteks organisasi 19 4.42
Proses pembangunan sistem 12 4.63
Konteks teknikal sistem 11 4.84
Jadual 5: Nilai min pengguna umum
Penilaian Bil Item Purata Nilai Min
Kepuasan pengguna 5 5.37
Kualiti sistem 8 5.49
Kualiti maklumat 10 5.37
Kegunaan sistem 5 5.18
Kualiti perkhidmatan 8 4.80
Penilaian dibuat terhadap 7 aplikasi utama e-kerajaan seperti yang dibincangkan di atas.
Dapat dilihat dalam Jadual 4, kesemua purata min bagi setiap konstruk adalah melebihi
4.0 di mana menunjukkan pengguna dalaman sistem e-kerajaan berpuas hati dengan
kesemua 7 aplikasi sistem yang digunakan dan menyokong penggunaan dan
pembangunan sistem tersebut. Nilai min di antara julat 4.5 hingga 5.0 adalah nilai terbaik
(Mohd Zaimi Abdul Majid dan Mc Affer, 1997). Manakala, dalam Jadual 5 pula
menunjukkan tahap penilaian mengikut persepsi pengguna umum. Jadual di atas
menunjukkan kesemua konstruk mendapat purata nilai min melebihi 5.0 ke atas, dan
hanya satu mendapat nilai 4.80 iaitu kualiti perkhidmatan. Ini menunjukkan pengguna
umum yang menggunakan aplikasi e-kerajaan berpuas hati dengan segala perkhidmatan
yang ditawarkan dan menyokong penggunaan sistem tersebut dalam urusan harian.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 255
5. Kesimpulan
Tujuan kerajaan elektronik diwujudkan adalah untuk memberi perkhidmatan yang terbaik
kepada masyarakat. Selain daripada itu meningkatkan kecekapan dan keberkesanan aktiviti-
aktiviti kerajaan ke tahap yang maksimum. Kerajaan elektronik dilihat mampu untuk
memudahkan dan meningkatkan perkhidmatan sektor swasta dan kerajaan khususnya. Ini
akan dapat menjadikan Malaysia sebagai sebuah negara maju sekali gus dapat menjana
ekonomi negara. Aplikasi kerajaan elektronik juga dapat menjimatkan kos seperti masa dan
tenaga khususnya serta kos penggunaan kertas apabila konsep paperless diperkenalkan dan
diaplikasikan sepenuhnya. Penilaian kepada sistem kerajaan elektronik juga dijalankan bagi
melihat pandangan dan persepsi pengguna terhadap aplikasi kerajaan elektronik ini dengan
mengambil kira nilai min pada setiap konstruk soalan kaji selidik. Data kajian pilot ini
melibatkan 70 responden, di mana 35 mewakili pengguna umum sistem dan 35 lagi mewakili
pengguna dalaman sistem iaitu kakitangan kerajaan yang terlibat secara langsung dalam
aplikasi e-kerajaan. Nilai min yang diperoleh daripada kedua-dua kumpulan ini adalah
melebihi 4.0 pada setiap konstruk, di mana menunjukkan pengguna setiap kumpulan
menerima dan menggunakan aplikasi e-kerajaan ini dalam urusan mereka. Kajian mungkin
dapat dijalankan terhadap responden yang lebih ramai untuk melihat sejauh mana aplikasi e-
kerajaan ini di terima oleh masyarakat di masa akan datang. Selain daripada itu, faktor
kejayaan dan kegagalan sistem juga mungkin boleh dikaji untuk dijadikan garis panduan
kepada aplikasi lain yang akan dibangunkan. Dengan itu ia akan memudahkan dan peratusan
kegagalan projek IT secara umumnya mungkin dapat dikurangkan.
Rujukan
Abdul Majid, M.Z dan Mc Caffer. (1997). Non excusable delay in construction
Loughborough: Phd thesis.
Accenture. (2004). E-Government Leadership: Higher Performance in government.
Accenture Report 2004.
Ake Gronlund (2002). Electronic Government: Design, Applications and Management. Idea
Group Publishing.
Asgarkhani, M., (2003) A Strategic Framework for Electronic Government. Proceeding of
the 22
nd
National IT Conference. Colombo, Sri Lanka.
Barnes, J. S. and Vidgen, R.. (2003). Measuring Web site quality improvements: A Case
Study of the forum on Strategic Management Knowledge Exchange. Industrial
Management and Data Systems. 103/5, 2003, p297 309.
Burn, J. and Robins, G. (2003). Moving towards e-government: A Case study of
organizational change processes. Logistics Information Management. Vol.: 16, No: 1,
2003, p 25 35.
Caldow, J. (2001). Seven E-Government Leadership Milestones. Institute for Electronic
Government, IBM Corporation.
Detlor, B. and Finn, K. (2002). Towards a framework for government portal design: The
Government, citizen and Portal perspective. Idea Group Publishing, Chapter VI.
Gale H. Roid & Thomas M. Haladyna .(1982). A Technology for Test-Item Writing. New
York : Harcourt Brace Jovonavich Publishers.
Ismail Hashim. (1998). Penglibatan Awam dalam kerajaan elektronik. Utusan Pengguna.
Julai , JIL 22 BIL 7, ms 12.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 256
Jabar, M. A., Selamat, H., Ghani, A. A. A., Ibrahim, H., Yusof, M. (2003). Qualitative
Research: An Investigation into Methods and Concepts of Qualitative Research in
Information System Research.
Jaeger, P.T and Thompson, K.M. (2003). E-Government around the world: Lessons,
challenges, and future directions. Government Information Quarterly
Longford, G. (2001). Rethinking E-Government: Dilemmas of Public service, Citizenship and
Democracy in the Digital Age, Canadian Political Science AAGM, May 27-29, 2001.
MAMPU. (1997). Blueprint for electronic Government Implementation.
MAMPU. (1997). Multimedia Super Corridor: Towards a Vision for a New Electronic
Government in Malaysia.
Mary Maureen Brown. (2003). Electronic Government. Encyclopedia of Public
Administration and Public Policy, Marcel Dekker,2003.pp.427-432.
Mohd Abkari Omar, Dr Mokhtar Mohd Yusof. (2006). Perlaksannan projek kerajaan
elektronik satu penilaian. Public Sector ICT Management Review. Vvol 1, no 1
Mohd Rais Abdul Karim and Nazariah Mohd Khalid. (2003). E-Government in Malaysia.
Subang Jaya: Pelanduk Publications (M). Sdn. Bhd.
Mohd-Yusof, M. (1996). Senior Executives Role in the Computer-Based Information System
(CBIS) Implementation Process: The Case of Malaysian Government Agencies.
Unpublished Ph.D Thesis, University of Salford, Salford, UK.
Mooi, T.S., (2001) Strategies in Developing Electronic Government: Malaysias Perspective,
MAMPU.
Muhammad Rais and Nazariah, (2003). E-Government in Malaysia. Pelanduk Publications.
NJ: Prentice Hall.
Omar, M. A., et al (2004), Implementing Electronic Government in Malaysia: An Impact
Study on the Seven Flagship Applications , Kuala Lumpur.
The 2002 e-readiness rankings, The Economist, A white paper from the Economist Intelligent
Unit, IBM Institute for Business Value, 2002.
United Nation Report (2002). Benchmarking E-Government: A Global Perspective Assessing
the UN member States: United Nations- DPEPA
Utusan Malaysia. (2007). Kerajaan Elektronik. Rabu 25/4/2007.
Walter R Borg & Meredith Damien Gall .(1979). Educational Research : An Introduction.
3rd Edition, New York, London : Longman.
William Wiersma. (2000). Research in Education : An Introduction. Boston : Allyn and
Bacon.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 257
PERSEPSI BAKAL GURU TERHADAP PENGINTEGRASIAN PAPAN PUTIH
INTERAKTIF (IWB) DALAM PROSES PENGAJARAN DAN PEMBELAJARAN
Termit Kaur Ranjit Singh & Shazalmi Saad
School of Educational Studies,
Universiti Sains Malaysia,
11800 Penang.
termitk@usm.my , shazalmi@yahoo.com
Abstrak
Perkembangan teknologi maklumat dunia turut membawa impak yang besar ke atas dunia
pendidikan di Malaysia. Sejajar dengan perkembangan tersebut, inovasi terhadap kurikulum
pendidikan mengorak langkah dengan memberi penekanan kepada aplikasi kaedah, teknik
dan strategi pengajaran khususnya menggunakan integrasi Teknologi Maklumat Komunikasi
(TMK) sebagai amalan dalam kalangan guru dalam konteks P&P. Oleh itu, pengkaji
mengambil inisiatif untuk menjalankan kajian persepsi bakal guru terhadap Papan Putih
Interaktif atau Interactive Whiteboard (IWB) yang merupakan sebahagian daripada
komponen TMK. Kajian ini bertujuan melihat persepsi bakal guru terhadap pengintegrasian
IWB dalam proses P&P. Sampel kajian ini terdiri daripada 61 orang bakal guru dari Pusat
Pengajian Ilmu Pendidikan, Universiti Sains Malaysia (USM), Pulau Pinang. Pengkaji telah
menggunakan kaedah campuran yang menggabungkan pendekatan kualitatif dan kuantitatif
dalam kajian ini. Data kuantitatif melibatkan satu set soal selidik, manakala data kualitatif
melibatkan soalan temu bual semi struktur. Data soal selidik dianalisis dengan menggunakan
perisian Statistical Package For Social Science Microsoft for Windows (SPSS) versi 15.0.
Ujian rintis menunjukkan nilai Alpha Cronbachs ialah 0.810. Analisis deskriptif
menunjukkan bahawa bakal guru mempunyai persepsi positif terhadap pengintegrasian IWB
dalam proses P&P. Di samping itu, analisis inferen menunjukkan bahawa terdapat perbezaan
yang signifikan persepsi bakal guru berdasarkan jantina. Namun, tidak terdapat perbezaan
yang signifikan persepsi bakal guru berdasarkan bangsa dan kemahiran menggunakan
komputer. Beberapa orang responden telah dipilih untuk menjawab soalan temu bual bagi
mendapatkan maklumat mengenai kelebihan, kelemahan dan halangan dalam
mengintegrasikan IWB. Pengkaji juga memberi beberapa cadangan agar IWB dapat
diintegrasikan dengan berkesan dalam proses P&P.
1. Pendahuluan
Masyarakat Malaysia pada abad ke-21 merupakan masyarakat yang hidup dalam era
globalisasi yang berorientasikan sains dan teknologi. Masyarakat sangat bergantung kepada
penggunaan sains dan teknologi dalam semua aspek kehidupan. Hal ini disebabkan
perubahan daripada era masyarakat industri (industrial society) kepada era masyarakat
bermaklumat (information society). Rentetan daripada perubahan tersebut turut mendorong
pembaharuan dan penggunaan unsur-unsur kreatif dalam amalan hidup seharian.
Penggerak utamanya adalah ilmu pengetahuan dan penyebarannya menerusi teknologi
maklumat dan komunikasi atau information technology and communication (ICT). Oleh
sebab pergantungan yang kuat terhadap teknologi maklumat, maka abad ke-21 dicirikan
sebagai abad ICT (Robiah Sidin dan Nor Sakinah Mohamad, 2003). Perkembangan ini telah
mempengaruhi dunia pendidikan terutamanya dalam kaedah pengajaran dan pembelajaran
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 258
(P&P). Pelbagai kaedah baru diperkenalkan bagi menjadikan pengajaran guru lebih berkesan
dan pembelajaran murid lebih bermakna (Jamalludin dan Zaidatun, 2003). Perkembangan
ICT yang pesat ini juga memberi kesan kepada perubahan kurikulum pendidikan Malaysia
(Yeoh, 2007).
Justeru, beberapa pengubahsuaian perlu dibuat dari segi penggunaan media
pengajaran dan pembelajaran. Kementerian Pendidikan juga telah mengadakan beberapa
reformasi pendidikan bertujuan untuk membaiki dan meningkatkan lagi kemampuan sistem
pendidikan untuk menghadapi cabaran yang mendatang (Lee, 2000). Antara perubahan yang
telah dilakukan adalah memperluas penggunaan TMK di sekolah dan di institusi pengajian
tinggi.
Salah satu kemampuan mengadaptasikan TMK ke dalam P&P adalah penggunaan
Papan Putih Interaktif atau Interactive Whiteboard (IWB). IWB merupakan alat bagi
memudahkan proses P&P dilaksanakan di dalam kelas. IWB adalah fleksibel, mudah
digunakan dan memuatkan pelbagai aplikasi yang membantu guru untuk memberi fokus
kepada pengajarannya dan menarik minat pelajar di dalam kelas. Ia adalah selaras dengan
kata-kata presiden SMART, iaitu Nancy Knowlton yang mengatakan bahawa penggunaan
IWB memberikan pengajaran guru lebih berkesan dan memudahkan ingatan pelajar terhadap
perkara yang disampaikan (SMART Technologies Inc., 2006)
Menyedari hal tersebut, beberapa fasa evolusi dalam sistem pendidikan negara telah
berlaku. Pendidikan dahulu berorientasikan kapur dan papan hitam sebagai medium untuk
menyampaikan ilmu kepada pelajar-pelajarnya. Teknik tersebut mengalami pembaharuan
apabila papan putih dan pen marker diperkenalkan sebagai pendekatan pengajaran yang lebih
moden dan mudah. Kini, penggunaan papan putih tersebut telah dinaiktaraf kepada IWB.
IWB ini lebih bersifat mesra pengguna, membantu guru merancang pengajaran dengan lebih
berkesan dan meningkatkan produktiviti secara total (Tun Faisal Ismail Aziz, 2009).
Namun, usaha kerajaan ini tidak akan berjaya jika guru beranggapan negatif terhadap
pengintegrasian TMK dalam proses P&P dan enggan menerima inovasi yang berlaku. Hal ini
terbukti dengan beberapa kajian menunjukkan bahawa kepercayaan guru berkaitan
penggunaan TMK dalam kerja-kerja mereka merupakan penentu dalam kemampuan guru
mengintegrasikan dalam pengajaran (Pajeras, 2002).
Menurut Clark dan Yinger (1977), pemikiran dan tingkah laku pengajaran guru
dipandu oleh satu set kepercayaan. Persepsi guru sentiasa memainkan peranan afektif dan
evaluatif dalam membuat penilaian berterusan tentang perkara-perkara di persekitaran
mereka. Justeru, persepsi guru akan berfungsi sebagai kerangka untuk mengorganisasikan
idea dan seterusnya membentuk satu agenda untuk melakukan tindakan (Lau Pong Hock dan
Fatimah Salleh, 2004).
Di Malaysia, walaupun sudah jelas pengintegrasian TMK mampu memberi impak
yang positif, namun pengintegrasian TMK dalam P&P masih pada tahap kurang
memberangsangkan (Zainuddin Abu Bakar et al., 2008). Hal ini kerana salah satu faktor yang
boleh mempengaruhi keberkesanan pengaplikasian TMK dalam P&P ialah persepsi guru dan
bakal guru. Sesetengah guru beranggapan bahawa inovasi dalam pengajaran termasuk TMK
adalah sebagai sesuatu yang membebankan, banyak kerja dan tenaga (Fullan, 1996). Kajian
yang telah dilakukan oleh Rumini Ku Ahmad mendapati bahawa penggunaan TMK dalam
P&P mampu membawa kepada sikap yang positif dalam kalangan pelajar.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 259
Kertas kerja ini bertujuan melihat persepsi bakal guru kerana golongan ini akan
berkhidmat di sekolah kelak. Oleh yang demikian, bakal guru harus bersedia menerima
sebarang perubahan inovasi yang berlaku.
Oleh itu, kertas kerja ini adalah bertujuan:
1. Meninjau persepsi bakal guru terhadap pengintegrasian IWB dalam proses P&P
berdasarkan faktor-faktor dalaman.
2. Mengenalpasti perbezaan persepsi bakal guru terhadap pengintegrasian IWB dalam
proses P&P berdasarkan faktor-faktor luaran.
2. Konsep Persepsi
Kamus Dewan Edisi Ketiga (2000) mendefinisikan persepsi sebagai gambaran atau bayangan
dalam hati atau fikiran (tentang sesuatu), pandangan (menerusi pancaindera) atau tanggapan.
Cambridge International Dictionary of English (1995) mendefinisikan persepsi
sebagai "a belief or opinion, often held by many people on appearances" atau dalam bahasa
Melayu "suatu kepercayaan atau pendapat yang biasanya diberikan oleh orang ramai
berdasarkan pemerhatian". Dalam kertas kerja, persepsi merujuk kepada tanggapan bakal
guru terhadap pengintegrasian IWB dalam proses P&P.
Terdapat banyak definisi persepsi yang dikemukakan oleh para cendiakawan.
Antaranya, Atkinson dan Hilgard (1991) mendefinisikan persepsi sebagai proses menyusun
dan mentafsir pola-pola rangsangan melalui organ penerimaan, kemudian menghasilkan dan
membentuk imej mengenai persekitarannya. Levesque (2006) telah mendefinisikan persepsi
sebagai satu proses bagaimana manusia memproses dan mengendalikan pelbagai maklumat
yang diperoleh daripada persekitarannya dengan menggunakan pancainderanya.
Selari dengan hal tersebut, Gibson et al. (1994) menjelaskan bahawa persepsi adalah
proses pemberian makna terhadap persekitaran oleh seorang individu. Leavitt et al. (1986)
berpendapat persepsi sebagai suatu pandangan pengertian, yakni bagaimana seseorang
memandang atau mentafsir sesuatu di mana persepsi seseorang ditentukan oleh kesesuaian
dengan keperluannya. Stephen et al. (2008) pula berpendapat persepsi boleh ditakrifkan
sebagai suatu proses yang membenarkan individu-individu mengorganisasikan dan
menginterpretasikan maklumat yang didapati daripada pancaindera agar memberi makna
pada persekitarannya.
Namun, kadangkala berlaku ketidaktepatan persepsi seseorang individu terhadap
individu yang lain. Dengan perkataan lain, persepsi tersebut kadangkala kurang tepat, bahkan
mungkin tidak tepat sama sekali. Faktor yang menyumbang kepada ketidaktepatan dalam
persepsi sosial adalah, Kesan Halo, stereotaip, persepsi terpilih, kesan perbandingan dan
projeksi (Ahmad Shukri, 2003).
Daripada pengertian persepsi di atas dapat disimpulkan bahawa persepsi yang
dimaksudkan di sini adalah tanggapan, penafsiran, penilaian, pandangan, pendapat,
pemahaman, dan reaksi yang diberikan oleh bakal guru terhadap pengintegrasian IWB dalam
proses P&P.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 260
Penulis ingin melihat persepsi dari sudut faktor dalaman dan luaran yang
mempengaruhi persepsi. Faktor dalaman merangkumi empat faktor, iaitu:
i) Persepsi berdasarkan pengalaman dan pembelajaran sedia ada
ii) Persepsi berdasarkan sikap dan minat
iii) Persepsi berdasarkan keperluan dan rasa
iv) Persepsi berdasarkan situasi semasa.
Manakala faktor luaran merangkumi jantina, bangsa dan kemahiran menggunakan
komputer.
3. Papan Putih Interaktif atau Interaktif Whiteboard (IWB)
IWB mula diperkenalkan oleh David Martin dan Nancy Knowlton pada tahun 1986. Pada
tahun 1991, inovasi alat ini mula dikembangkan dengan lebih meluas. IWB melalui SMART
Board ini merupakan IWB yang pertama berdasarkan sentuhan menggunakan jari. Ia
menyediakan kawalan daripada aplikasi komputer yang dihubungkan dengan projektor dan
bahan yang dibina oleh guru untuk pengajarannya akan dipaparkan ke IWB tersebut.
IWB merupakan skrin kawalan sentuh yang terdiri daripada tiga teknologi yang
digabungkan bersama, iaitu sebuah komputer dengan perisian, projektor dan papan putih khas
yang turut disepadukan melalui aplikasi Microsoft. Komponennya disambungkan secara
tanpa wayar, atau menerusi kabel USB atau bersiri. Projektor yang disambungkan kepada
komputer akan menayangkan imej dari komputer ke atasnya. IWB menerima sentuhan input
daripada jari atau pen, dan pemacu SMART Board akan menukar sentuhan pada IWB kepada
klik tetikus atau dakwat digital. Rajah 1.1 menunjukkan tiga teknologi yang digabungkan
bersama, iaitu sebuah komputer dengan perisian, projektor dan papan putih khas yang turut
disepadukan melalui aplikasi Microsoft (Steven, 2008).
Rajah 1.1 : Gabungan Tiga Teknologi
(Sumber: Steven, 2008)
4. Tinjauan Kajian berkaitan Penggunaan IWB dalam proses P&P
Fabienne Gerard & Jamey Widener (1997) membincangkan bagaimana alat ini memudahkan
guru dan pelajar di dalam kelas pembelajaran bahasa asing. Alat ini saat interaktif, inovatif
dan berpengaruh sebagai alat dalam pembelajaran bahasa asing.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 261
Mary Ann Bell (1998) dalam kajiannya, iaitu Teachers Perceptions Regarding the
Use of the Interactive Electronic Whiteboard in Instruction menyimpulkan bahawa IWB
dapat mencetuskan semangat guru dan pelajar untuk terus terlibat dalam proses P&P
berbanding kaedah pengajaran tradisional. IWB pasti akan berkembang sebagai alat bantu
mengajar kepada guru, pelatih dan pelajar.
Fran Silverman dalam artikel yang bertajuk Lighting the Dark Ages (2003)
menegaskan bahawa fungsi IWB membolehkan guru mengambil (capture) nota dan menulis
di IWB dengan pen penanda (marker) yang khusus. Nota tersebut dapat disimpan di dalam
pengkalan data seterusnya dapat dimuatnaikkan ke dalam laman web. Dengan ini, pelajar
dapat melihatnya pada bila-bila masa dan di mana jua untuk mengulangkajinya semula.
Dalam satu majalah Interactive Classroom Vol.2, (Issue 2, April 2007) dalam
subtopiknya yang bertajuk Interactive whiteboard create enthusiasm for ICT in Malaysia
menyatakan bahawa penggunaan IWB telah mencetuskan satu keghairahan ICT di negara ini.
Artikel ini juga telah menyatakan bahawa di Malaysia menunjukkan maklum balas yang
positif tentang penggunaan IWB terhadap pemahaman dan motivasi pelajar.
Menurut satu kajian yang telah dijalankan oleh Raja Maznah Raja Hussain (2006)
yang bertajuk Deployment of ICT: A Case fo The Interactive Whiteboard menyatakan
bahawa penggunaan IWB ini adalah satu corak atau insentif yang boleh menghasilkan satu
suasana yang menyeronokkan dan diperlukan dalam bilik darjah di mana ia dapat membantu
guru untuk membentuk suasana pembelajaran yang memotivasikan para pelajar.
Berdasarkan pemerhatian di Amerika Syarikat, Gerard & Widener (1999) menyatakan
bahawa IWB menyokong interaksi dan percakapan di dalam kelas. Berdasarkan pemerhatian
di United Kingdom pula mendapati dua pertiga guru merasakan IWB menawarkan beberapa
strategi untuk mengembangkan pengajaran interaktif (Latham, 2002). Bush et al. (2004)
menyebut IWB mampu menjadikan pengajaran lebih visual dan pembelajaran lebih interaktif.
Keadaan ini mendorong penglibatan pelajar yang tinggi, meningkatkan motivasi dan tumpuan
pelajar lebih berfokus.
Pemerhatian di Australia juga menunjukkan dapatan yang positif. Kent (2003)
menyatakan bahawa dengan penggunaan IWB menjadikan pembelajaran lebih
menyeronokkan dan menarik serta penglibatan pelajar di dalam kelas lebih besar. Keadaan
ini dapat dilihat juga di dalam kelas tadika di mana kanak-kanak tersebut menyatakan bahawa
IWB menyeronokkan (Lee & Boyle, 2003).
5. Kerangka Konsep
Kerangka konsep yang mendasari kertas kerja ini ditunjukkan dalam Rajah 1.2. Berdasarkan
kerangka konsep tersebut, faktor dalaman dan luaran mempengaruhi persepsi bakal guru
terhadap pengintegrasian IWB dalam proses P&P.
Rajah 1.2: Kerangka Konsep
Faktor Dalaman
a) Pengalaman dan
pembelajaran sedia
ada
b) Sikap dan minat
c) Keperluan dan rasa
d) Situasi semasa
Persepsi Terhadap
Pengintegrasian IWB
Faktor Luaran
a) Jantina
b) Bangsa
c) Kemahiran
menggunakan
komputer
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 262
Metodologi
Kaedah Kajian
Kertas kerja ini mengadaptasikan pendekatan kuantitatif dan menggunakan kaedah tinjauan
(survey) bagi mengumpul data. Mengikut Cooke & Rousseau (1988) bahawa kaedah
kuantitatif ini membawa kelebihan kepada kajian rentas sesuatu organisasi (cross-sectional
organization research) dan kajian berskala besar. Soalan objektif ini adalah lebih baik dari
temu duga kerana ia akan mengurangkan perasaan berat sebelah (bias) yang dijalankan oleh
kaedah kualitatif.
Mengikut Borg & Gall (1971) dan Gay (2006) bahawa kaedah tinjauan ini digunakan
kerana pengumpulan data melalui kaedah ini terbukti lebih efisien dan menjimatkan masa
berbanding kaedah-kaedah lain. Atas alasan di atas penulis memilih untuk menjalankan
kaedah tinjauan dalam kertas kerja ini.
Persampelan
Pengkaji menggunakan persampelan bertujuan (purposive sampling). Kenneth (1982)
menyatakan bahawa persampelan jenis ini membolehkan pengkaji menggunakan
pertimbangan sendiri untuk memilih responden dan hanya memilih responden yang paling
sesuai dengan tujuan kajiannya. Sampel yang dipilih adalah pelajar yang sukarela menghadiri
sesi latihan IWB yang diadakan di SmartLab di Pusat Pengajian Ilmu Pendidikan, USM,
Pulau Pinang.
Instrumen kajian
Bagi mencapai tujuan tersebut, terdapat dua jenis data yang digunakan, iaitu data premier dan
data sekunder. Data premier merupakan data utama yang digunakan untuk mencapai objektif
kertas kerja, iaitu data yang diperoleh daripada responden melalui kaedah soal selidik.
Manakala data sekunder pula diperoleh daripada laman web Smart Technologies Inc., kajian-
kajian lepas, kertas seminar, kertas kerja, Internet dan kajian di perpustakaan.
Pengumpulan data
Borang soal selidik terbahagi kepada 2 bahagian iaitu Bahagian A dan B. Bahagian A terdiri
daripada 5 soalan yang berkaitan dengan maklumat demografi atau latar belakang bakal guru,
iaitu penghususan, jantina, umur, bangsa dan kemahiran menggunakan komputer. Bahagian B
terdiri daripada 24 soalan berkaitan dengan persepsi bakal guru terhadap pengintegrasian
IWB dalam proses P&P. Set soal selidik Bahagian B ini menggunakan Skala Likert 5 markat.
Daripada 24 soalan tersebut 19 soalan adalah berbentuk positif dan 4 soalan adalah berbentuk
negatif.
Susunan markatnya adalah seperti berikut:
Bagi sampel yang memilih markat 5 dan 4 dikumpulkan sebagai kumpulan kontinum
persepsi positif dan markat 1 dan 2 dikumpulkan sebagai kumpulan kontinum persepsi
negatif. Manakala markat 3 dikategorikan sebagai tidak pasti.
Sangat setuju Sangat tidak setuju
1 2 3 4 5
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 263
Analisis Data
Dapatan daripada borang soal selidik dianalisis dengan menggunakan perisian Statistical
Packages for Sosial Sciences (SPSS) versi 11.5.
Analisis Statistik Deskriptif
Persepsi Bakal Guru terhadap Pengintegrasian IWB berdasarkan faktor-faktor
Dalaman
Pengkaji juga melihat persepsi bakal guru berdasarkan faktor-faktor dalaman yang
mempengaruhinya. Kenyataan bagi setiap faktor dalaman yang digunakan dalam kajian ini
adalah merujuk kepada kajian Che Azura (2008). Pengkaji melakukan sedikit
pengubahsuaian bagi menjawab persoalan kajian. Terdapat empat faktor dalaman yang
diutarakan di dalam kertas kerja ini, iaitu:
i. Persepsi berdasarkan pengalaman dan pembelajaran sedia ada
ii. Persepsi berdasarkan sikap dan minat
iii. Persepsi berdasarkan keperluan dan rasa
iv. Persepsi berdasarkan situasi semasa
Persepsi Berdasarkan Pengalaman dan Pembelajaran Sedia Ada
Jadual 1.3 : Dapatan min, sisihan piawai, kekerapan dan peratusan item-item persepsi
berdasarkan pengalaman dan pembelajaran sedia ada. (n=61)
No.
Item
PENYATAAN
Persepsi
negatif
Persepsi
positif
Min
Persepsi
Sisihan
piawai
Bil % Bil %
4 Penggunaan IWB
mendorong perbincangan
kelas menjadi lebih berkesan
0 0 61
100 5.0 .00
13 Belajar dengan
menggunakan IWB
membolehkan pelajar belajar
dengan aktif
0 0 61
100
5.0 .00
2 Penggunaan IWB memberi
idea kepada saya untuk
menjadi lebih kreatif
2 3.3 59 96.7 4.87 .72
23 Pelajar tidak mengantuk jika
guru menggunakan IWB
2 3.3 59 96.7 4.87 .72
6
Penggunaan IWB dapat
membantu pelajar
menyelesaikan pelbagai
masalah pembelajaran
sendiri
6 9.8 55 90.2 4.61 1.20
17 Penggunaan IWB sukar
dilaksanakan di dalam kelas
24 39.3 37 60.7 3.43 1.97
22 Pelajar tidak dapat
mengingati pengajaran guru
dengan lebih baik apabila
IWB digunakan
50 82.0 11 18.0 1.72 1.55
Jumlah keseluruhan
4.21
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 264
Berdasarkan jadual 1.3, item 4, iaitu penggunaan IWB mendorong perbincangan kelas
menjadi lebih berkesan dan item 13, iaitu belajar dengan menggunakan IWB membolehkan
pelajar belajar dengan aktif menunjukkan persepsi positif yang paling tinggi. Dapatan
menunjukkan bahawa semua bakal guru bersetuju dengan kenyataan tersebut, iaitu masing-
masing min persepsi 5.00. Manakala kenyataan yang mendapat min persepsi yang paling
rendah, iaitu min persepsi 1.72 ialah item 22, iaitu pelajar tidak dapat mengingati pengajaran
guru dengan lebih baik apabila IWB digunakan. Bagi item 22 ini, seramai 11 orang (18.0%)
adalah mempunyai persepsi positif, manakala 50 orang (82%) mempunyai persepsi negatif.
Min keseluruhan bagi semua item adalah 4.21 menggambarkan bahawa faktor pengalaman
dan pembelajaran sedia ada mempengaruhi persepsi bakal guru.
Persepsi berdasarkan Sikap dan Minat
Jadual 1.4 : Dapatan min, sisihan piawai, kekerapan dan peratusan item-item persepsi
berdasarkan sikap dan minat. (n=61)
No.
Item
PENYATAAN
Persepsi
negatif
Persepsi
positif
Min
Persepsi
Sisihan
piawai
Bil % Bil %
3 Gambar rajah dan tulisan
yang teratur dan mudah
dibaca pada IWB menarik
minat pelajar untuk belajar
0 0 61 100 5.0 .00
12 Penggunaan IWB dalam
pengajaran lebih merangsang
semangat pelajar untuk
belajar dengan bersungguh-
sungguh
0 0 61 100 5.0 .00
1 Saya suka penggunaan IWB
dalam pengajaran
2 3.3 59 96.7 4.87 .72
14 Pelajar memahami
pengajaran guru dengan
lebih jelas jika guru
menggunakan IWB
2 3.3 59 96.7 4.87 .72
11 Guru menjadi lebih yakin
menyampaikan isi pelajaran
jika menggunakan IWB
3 4.9 58 95.1 4.80 .87
Jumlah keseluruhan
4.91
Jadual 1.4 menunjukkan dapatan persepsi berdasarkan faktor sikap dan minat bakal guru.
Dapatan menunjukkan item 3, iaitu gambar rajah dan tulisan yang teratur dan mudah dibaca
pada IWB menarik minat pelajar untuk belajar dan item 12, iaitu penggunaan IWB dalam
pengajaran lebih merangsang semangat pelajar untuk belajar dengan bersungguh-sungguh
menunjukkan persepsi positif yang paling tinggi. Kedua-dua item mempunyai nilai min
persepsi 5.00. Keadaan ini menunjukkan bahawa semua bakal guru bersetuju dengan
pernyataan tersebut. Manakala kenyataan yang mendapat min persepsi yang paling rendah,
iaitu min persepsi 4.80. item yang terlibat ialah item 11, iaitu guru menjadi lebih yakin
menyampaikan isi pelajaran jika menggunakan IWB. Bagi item 11 ini, seramai 58 orang
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 265
(95.1%) adalah mempunyai persepsi positif, manakala 3 orang (4.9%) mempunyai persepsi
negatif. Min keseluruhan bagi semua item adalah 4.91 menggambarkan bahawa faktor sikap
dan minat mempengaruhi persepsi bakal guru.
Persepsi berdasarkan Keperluan dan Rasa
Jadual 1.5 : Dapatan min, sisihan piawai, kekerapan dan peratusan item-item persepsi
berdasarkan faktor keperluan dan rasa. (n=61)
No.
Item
PENYATAAN
Persepsi
negatif
Persepsi
positif
Min
Persepsi
Sisihan
piawai
Bil % Bil %
20 Mengajar dengan
menggunakan IWB
memudahkan pengajaran
0 0 61 100 5.0 .00
8 Penggunaan IWB menarik
minat pelajar untuk belajar
2 3.3 59 96.7 4.87 .72
9 Pelajar lebih suka belajar jika
guru menggunakan IWB
2 3.3 59 96.7 4.87 .72
7 Pelajar dapat berfikir dengan
lebih sistematik jika guru
menggunakan IWB
4 6.6 57 93.4 4.74 .998
18 Guru perlu menggunakan
IWB yang sesuai setiap kali
mengajar
5 8.2 56 91.8 4.67 1.11
16 Guru dapat menyampaikan
isi pelajaran dengan lebih
baik dan berkesan semasa
menggunakan IWB
6 9.8 55 90.2 4.61 1.20
21 Penggunaan IWB tidak
banyak membantu dalam
pengajaran
52 85.2 9 14.8 1.59 1.43
24 Penggunaan IWB tidak
mengubah pencapaian
pelajar
52 85.2 9 14.8 1.59 1.43
Jumlah keseluruhan
3.99
Jadual 1.5 menunjukkan dapatan persepsi berdasarkan faktor keperluan dan rasa. Dapatan
kajian menunjukkan item 20, iaitu mengajar dengan menggunakan IWB memudahkan
pengajaran merupakan item berpersepsi positif yang paling tinggi, iaitu min persepsi 5.00.
Manakala item 21, iaitu penggunaan IWB tidak banyak membantu dalam pengajaran dan
item 24, iaitu penggunaan IWB tidak mengubah pencapaian pelajar adalah berpersepsi positif
yang paling rendah. Kedua-dua item ini menunjukkan min persepsi yang sama, iaitu 1.59.
Seramai 9 orang (14.8%) adalah berpersepsi positif dan 52 orang (85.2%) adalah berpersepsi
negatif. Secara keseluruhannya, min persepsi untuk faktor keperluan dan rasa adalah 3.99. Ini
menunjukkan faktor keperluan dan rasa mempengaruhi persepsi bakal guru tersebut.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 266
Persepsi berdasarkan Situasi Semasa
Jadual 1.6 : Dapatan min, sisihan piawai, kekerapan dan peratusan item-item persepsi
berdasarkan situasi semasa. (n=61)
No.
Item
PENYATAAN
Persepsi
negatif
Persepsi
positif
Min
Persepsi
Sisihan
piawai
Bil % Bil %
15 Pelajar berasa seronok ketika
cuba menggunakan IWB
sendiri
0 0 61 100 5.0 .00
5 Penggunaan IWB
membolehkan pengajaran
guru menjadi lebih licin dan
sempurna
1 1.6 60 98.4 4.93 .51
19 Pelajar tidak berasa bosan
ketika belajar dengan
menggunakan IWB
2 3.3 59 96.7 4.87 .72
10 Pelajar dapat
menggambarkan konsep
pembelajaran yang hendak
disampaikan oleh guru
dengan lebih jelas jika guru
menggunakan IWB untuk
menerangkan konsep
4 6.6 57 93.4 4.74 .998
Jumlah keseluruhan
4.89
Jadual 1.6 menunjukkan dapatan persepsi berdasarkan situasi semasa. Dapatan kajian
menunjukkan item 15, iaitu pelajar berasa seronok ketika cuba menggunakan IWB sendiri
merupakan item berpersepsi positif yang paling tinggi. Manakala item 10, iaitu pelajar dapat
menggambarkan konsep pembelajaran yang hendak disampaikan oleh guru dengan lebih jelas
jika guru menggunakan IWB untuk menerangkan konsep merupakan item yang mempunyai
min persepsi paling rendah. Dapatan kajian bagi item 15 menunjukkan semua responden
berpersepsi positif, iaitu nilai min persepsi 5.00. Bagi item 10 menunjukkan min persepsi
4.74. Seramai 57 orang (93.4%) adalah berpersepsi positif dan 4 orang (6.6%) adalah
berpersepsi negatif. Secara keseluruhannya, min persepsi untuk faktor situasi semasa adalah
4.89. Ini menunjukkan faktor situasi semasa mempengaruhi persepsi bakal guru tersebut.
Analisis Statistik Inferen
Analisis statistik inferen melihat perbezaan persepsi bakal guru terhadap pengintegrasian
IWB dalam proses P&P berdasarkan faktor-faktor luaran, iaitu jantina, bangsa dan kemahiran
menggunakan komputer.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 267
Perbezaan Persepsi Bakal Guru Terhadap Pengintegrasian IWB dalam Proses P&P
Berdasarkan Jantina
Hipotesis 1: Tidak terdapat perbezaan yang signifikan bagi persepsi bakal guru terhadap
pengintegrasian IWB dalam proses P&P berdasarkan jantina.
Jadual 1.7: Perbezaan min persepsi berdasarkan jantina (n=61)
Jadual 1.8 : Dapatan ujian-t bebas bagi perbezaan persepsi berdasarkan jantina (n=61)
Ujian Levene T df P
F P
Persepsi Andaian nilai varian
sama
8.574 .005 -2.777 59 .007
Andaian nilai varian
tidak sama
-1.909 15.714 .075
Tahap signifikan adalah pada paras p < 0.05
Berdasarkan jadual 1.7, didapati perbezaan min persepsi bakal guru perempuan (4.46)
daripada min persepsi bakal guru lelaki (4.20) adalah 0.26. Berdasarkan jadual 1.8, Ujian-t
bebas menunjukkan nilai p yang bersamaan .007 adalah kurang daripada nilai aras keertian
0.05 (pada t = -2.77 dan df = 59), maka hipotesis 1 adalah ditolak. Ini menunjukkan bahawa
terdapat perbezaan persepsi antara guru perempuan dan lelaki.
Perbezaan Persepsi Bakal Guru terhadap Pengintegrasian IWB dalam Proses P&P
berdasarkan Bangsa
Hipotesis 2: Tidak terdapat perbezaan yang signifikan persepsi bakal guru terhadap
pengintegrasian IWB dalam proses P&P berdasarkan bangsa.
Jadual 1.9: Perbezaan min persepsi berdasarkan bangsa (n=61)
Bangsa
N Min Sisihan
piawai
Melayu 36 4.35 .38
Cina 8 4.78 .21
India 15 4.49 .25
Lain-lain 2 4.17 .00
Jumlah 61 .33
Jantina
Bilangan Min Sisihan
piawai
Lelaki 15 4.20 .51254
Perempuan 46 4.46 .21995
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 268
Jadual 1.10 : Dapatan Ujian ANOVA Satu Hala bagi Purata Persepsi untuk melihat
Perbezaan Min berdasarkan Bangsa (n = 61)
Tahap signifikan adalah pada paras p < 0.05
Jadual 1.9 menunjukkan min persepsi berdasarkan bangsa. Bangsa Cina menunjukkan min
persepsi positif yang lebih tinggi, iaitu 4.78, manakala bangsa lain-lain menunjukkan min
persepsi yang paling rendah, iaitu 4.17. Walau bagaimanapun, tidak terdapat perbezaan yang
signifikan persepsi bakal guru berdasarkan bangsa. Berdasarkan jadual 1.10, keputusan ujian
ANOVA satu hala bagi purata persepsi menunjukkan tidak terdapat perbezaan min persepsi
berdasarkan bangsa. Keputusan ini ditunjukkan melalui nilai F = 1.093, p = 0.360, iaitu lebih
tinggi daripada nilai aras keertiaan 0.05. Maka, hipotesis 2 diterima, iaitu tidak terdapat
perbezaan yang signifikan persepsi bakal guru terhadap pengintegrasian IWB di dalam P&P
berdasarkan bangsa.
Perbezaan Persepsi Bakal Guru terhadap Pengintegrasian IWB dalam Proses P&P
berdasarkan Kemahiran Menggunakan Komputer
Hipotesis 3: Tidak terdapat perbezaan yang signifikan persepsi bakal guru terhadap
pengintegrasian IWB dalam proses P&P berdasarkan kemahiran menggunakan komputer.
Jadual 1.11: Perbezaan min persepsi berdasarkan kemahiran menggunakan komputer (n=61)
Kemahiran komputer N Min Sisihan piawai
Sangat baik 1 4.17
Baik 44 4.37 .36
Sederhana 16 4.49 .25
Jumlah 61 4.40 .33
Jadual 1.12 : Dapatan Ujian ANOVA Satu Hala bagi Purata Persepsi Untuk Melihat
Perbezaan Min Berdasarkan Kemahiran Menggunakan Komputer (n = 61)
Tahap signifikan adalah pada paras p < 0.05
Sumber
Variasi
Jumlah
Kuasa
Dua
Darjah
Kebebasa
n
Min Kuasa
Dua
F Sig.
Antara
kumpulan
.360 3 .120
1.093 .360 Dalam
kumpulan
6.260 57 .110
Jumlah 6.620 60
Sumber
Variasi
Jumlah
Kuasa
Dua
Darjah
Kebebasa
n
Min Kuasa
Dua
F Sig.
Antara
kumpulan
.229 2 .114
1.037 .361 Dalam
kumpulan
6.392 58 .110
Jumlah 6.620 60
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 269
Jadual 1.11 menunjukkan min persepsi berdasarkan kemahiran menggunakan komputer.
Berdasarkan jadual 1.12, keputusan ujian ANOVA satu hala bagi purata persepsi
menunjukkan tidak terdapat perbezaan min persepsi mengikut kemahiran menggunakan
komputer. Keputusan ini ditunjukkan melalui nilai F = 1.037, p = 0.361, iaitu lebih tinggi
daripada nilai aras keertian 0.05. Maka, hipotesis 3 diterima, iaitu tidak terdapat perbezaan
yang signifikan persepsi bakal guru terhadap pengintegrasian IWB di dalam P&P
berdasarkan kemahiran menggunakan komputer.
Kesimpulan dan Cadangan
Kesimpulannya, analisis deskriptif mendapati bahawa keempat-empat faktor dalaman yang
dinyatakan dalam perbincangan kertas kerja ini mempengaruhi persepsi bakal guru terhadap
pengintegrasian IWB. Hal ini terbukti berdasarkan nilai min keseluruhan bagi setiap faktor
adalah positif. Dapatan analisis inferen pula menerangkan bahawa bakal guru perempuan
menunjukkan persepsi yang lebih positif berbanding bakal guru lelaki. Dapatan ini juga
menjelaskan bahawa bangsa dan kemahiran menggunakan komputer bukanlah faktor yang
menentukan persepsi bakal guru terhadap IWB.
Hasil dapatan ini wajar dipertimbangkan bagi membantu polisi pendidikan negara.
Perancang polisi pendidikan negara diharap dapat memberi reaksi yang positif seterusnya
dapat merealisasikan sesuatu strategi dan satu penyelesaian yang bersesuaian agar
penggunaan IWB dapat diperluaskan ke semua sekolah. Hal ini bertujuan memberi faedah
kepada guru dan pelajar dalam usaha mencapai matlamat yang digariskan. Guru-guru perlu
diberikan kursus-kursus berkaitan penggunaannya dari semasa ke semasa agar dapat
meningkatkan kompentensi dalam mengendalikan peralatan dan perisian.
Di samping itu, pihak kementerian dan pentadbir sekolah perlu lebih peka terhadap
prasarana sekolah agar aplikasi perkakasan dan perisian dapat diuruskan dengan cekap tanpa
gangguan. Misalnya, keadaan bilik darjah yang tidak kondusif, keadaan fizikal bilik darjah,
gangguan punca elektrik dan gangguan-gangguan lain yang boleh membantutkan proses ini.
Bagi guru-guru yang sedia ada di sekolah, beberapa program atau kursus dalam
perkhidmatan boleh diadakan untuk membantu meningkatkan kemahiran menggunakan ICT
dalam proses P&P. Pada masa yang sama, bakal-bakal guru perlu diberikan pendedahan
mengenai pengetahuan dan kemahiran ICT dalam P&P semasa mereka mengikuti kursus
perguruan di institusi pendidikan masing-masing. Hal ini dapat membantu mereka
menggunakan ICT sebagai alatan dalam pengajaran mereka apabila mengajar kelak.
RUJUKAN
Ahmad Shukri Mohd Nain, (2002). Tingkah Laku Organisasi Pengenalan Tingkah Laku
Individu. Skudai: Universiti Teknologi Malaysia.
Atkinson, R. C. & Hilgar E. R., (1991). Pengantar Psikologi. Terjemahan Nurjanah, Taufik &
Rukmini. Jakarta: Barhana, Erlangga.
Borg, W. R. & Gay. M.D., (1971). Educational Research. An Introduction (2
nd
ed.). New
York: McKay Company.
Bush, N., Priest, J. & Coe, R., (2004). An Exploration of the Use of ICT at the Millennium
Primary School, Greenwich. 21 Ogos 2009 dari
www.becta.co.uk/page_documents/research/greenwich_mps_report.pdf
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 270
Cambridge International Dictionary of English, (1995). Cambridge University Press: First
Edition.
Che Azura Che An, (2008). Tinjauan Persepsi Guru Matematik Terhadap Perisian Autograf
Sebagai Satu Inovatif Baru Dalam Pengajaran dan Pembelajaran Dalam Kalangan
Guru Matematik dan Matematik Tambahan di MRSM. Laporan Projek Sarjana. Pulau
Pinang: Universiti Sains Malaysia.
Clark, C. M. dan Yingger, R. J., (1977). Research on Teaching Thinking, Curiculum Inquiry.
Vol. 7.College Journal, 70(2), m.s. 10-15
Cooke, R. A., & Rousseau, D. M. A., (1988). Behavioural Norma And Expectations. A
Quantitative Approach To The Assessment Of Organizational Culture. Group &
Organizational Studies, 13(3), 245-273.
Dewan Bahasa dan Pustaka, (2000). Kamus Dewan Edisi Ketiga. Kuala Lumpur:
Kementerian Pendidikan Malaysia, Edisi ketiga.
Fabienne Gerard & Jamey Widener, (1997). A SMARTer Way to Teach Foreign Language:
The SMART Board Interactive Whiteboard as a Language Learning Tool.
Diperoleh pada 8 Disember 2008 dari
http://education.smarttech.com/NR/rdonlyres/3CABE650-1C29-4E3A-BC21-
45BB97F08B0D/0/SBforeignlanguageclass.pdf
Frank Silverman, (2003). Lighting the Dark Ages. Special Section: Presentation System.
Fullan, M., (1996). The New Meaning of Educational Change. New York: Teacher College
Press.
Gay, L.R., Mills, G.E. & Airasian, P., (2006). Educational Research: Competencies for
analysis and applications (8
th
ed.). New Jersey: Pearson Prentice Hall.
Gerard, F., & Widener, J., (1999). A Smarter Way to Teach Foreign Language: The SMART
Board Interactive Whiteboard as a Language Learning Tool. Diperoleh pada 8
Disember 2009 dari
http://edcompass.smarttech.com/en/learning/research/SBforeignlanguageclass.pdf.
Gibson, J., Ivan Cevich, J. & Donnelly, J., (1994). Organizations Behavior Structure Process
(8
th
ed.). Boston: Irwin.
Interactive Whiteboard Create Enthusiasm For ICT in Malaysia. Interactive Classroom Vol.2,
Issue 2, April 2007.
Jamalludin Harun & Zaidatun Tasir, (2003). Multimedia dalam Pendidikan. Kuala Lumpur:
PTS Publication.
Kenneth, B. D., (1982). Methods of social research ( 2
nd
ed.). New York: Free press.
Kent, P., (2003). e-Teaching The Elusive Promise. Diperoleh pada 21 Ogos 2009 dari
http://edcompass.smarttech.com/en/learning/research/pdf/kent1.pdf.
Latham, P., (2002). Teaching and Learning Primary Mathematics: The Impact of Interactive
Whiteboards. Diperoleh pada 2 April 2009 dari
www.beam.co.uk/pdfs/RES03.pdf.
Lau Pong Hock & Fatimah Salleh, (2004). Persepsi Guru Terhadap Pengajaran Matematik
dalam Bahasa Inggeris dalam Diges Pendidik, Jilid 4, Bil. 1/2004. Pulau Pinang:
Universiti Sains Malaysia.
Leavitt, H. J., Pondy, L. R. & Boje, D. M., (1982). Reading In managerial Psychology (4
th
ed.). Chicago: University of Chicago Press.
Lee G. S., (2000). IT & Education in Malaysia : Problems, Issues and Challenges. Kuala
Lumpur: Longman.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 271
Lee, M., & Boyle, M., (2003). The Educational Effects and Implications of the Interactive
Whiteboard Strategy of Richardson Primary School: A Brief Review. Diperoleh pada
12 Jun 2009 dari
www.richardsonps.act.edu.au/RichardsonReview_Grey.pdf.
Leveque, R. J. R., (2006). The Psychology and Law of Criminal Justice Process. New York:
Nova Science Publishers.
Mary Ann Bell, (1998). Teachers Perceptions Regarding the Use of the Interactive
Electronic Whiteboard in Instruction. Diperoleh pada 12 Jun 2009 dari
http://teachers.net/gazette/JAN02/mabell.html
Pajeras, M. E., (2002). Teachers beliefs and educational research: cleaning up a messy
construct. In review of Educational Research, 62(3)
Raja Maznah Raja Hussain, (2006). Deployment Of Ict: A Case For The Interactive
Whiteboard, Malaysian Online Journal of Instructional Technology (MOJIT) Vol. 3,
No.1, pp 78-84, University of Malaya: Curriculum and Instructional Technology
Department. Diperoleh 21 Februari 2008 dari
http://pppjj.usm.my/mojit/articles/pdf/0406/09-raja-maznah_um-final.pdf
Robiah Sidin dan Nor Sakinah Mohamad, (2003). Pembudayaan Teknologi Maklumat dan
Komunikasi (ICT) di Kalangan Pelajar: Ke Arah Mengurangkan Jurang Pendidikan.
Diperoleh pada 21 Ogos 2009 dari
http/://www.geocities.com/ummuamalin/preparation.pdf
Rumini Ku Ahmad, (t.t). Integrasi Teknologi Komunikasi dan Maklumat dalam Pengajaran
dan Pembelajaran. Diperoleh pada 9 Mac 2008, dari
www.sazlie.com/index2.php?option=com_docman&task=doc_view&gid=6&Itemid=
99999999
SMART Technologies Inc., (2006).Interactive Whiteboard and Learning: Improving Student
Learnig Outcomes and Streamlining Lesson Planning. Diperoleh pada 29 Jun 2009
dari
www2.smarttech.com/.../Int_Whiteboard_Research_Whitepaper_Update.pdf
Stephen P. R., Timothy A. & Judge, T. J., (2008). Organizational Behavior. New Jersey:
Prentice Hall.
Steven W. A., (2008). District Instructional Technologist-Smartboard Training. SMART
Technologies ULC. Dilayari pada 2 April 2009 dari
www.scribd.com/doc/.../Smartboard-10-Training-Manual
Susan Cooper, (2005). A School Installation of Whiteboards. Media & Methods, Mar/Apr
2005, Vol. 41, Issue 5.
Tun Faisal Ismail Aziz, (2009). Papan putih interaktif merangsang transformasi P&P, dlm.
Akhbar dalam Pendidikan (ADaP) Utusan Malaysia, Rabu, 24 Jun. Diperoleh pada 25
September 2009 dari
http://www.tutor.com.my/tutor/dunia.asp?y=2009&dt=0625&pub=DuniaPendidikan
&sec=Perspektif&pg=ps_01.htm
Yeoh Poh Choo, (2007). Proses Transformasi Pelajar Multimedia Interaktif Sebagai Agen
Perubahan Melalui Penggunaan Tekknologi Maklumat Dan Komunikasi, Universiti
Sains Malaysia, Pualu Pinang, Tesis Phd.
Zainuddin Abu Bakar, Meor Ibrahim Kamaruddin, Mohd Ali Ibrahim & Rahmad Sukor Ab
Samad, (2008). Kemahiran ICT di Kalangan Guru pelatih IPTA Malaysia, Kuala
Lumpur: Arah Publications.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 272
THE CHALLENGES AND OPPORTUNITIES OF ISLAMIC STUDIES IN THE
WORLD OF MODERN CYBER-TECHNOLOGIES: THE NIGERIA EXAMPLE
Adebayo, Rafiu Ibrahim
Department of Religions,
University of Ilorin,
Ilorin, Nigeria.
adrafhope@yahoo.com
Abstract
Just like the angels, who, in their one-sidedness saw only the mischief of mankind and so
remonstrated about the creation of Adam, many scholars seem to have emphasised numerous
illegal activities and vulnerability of the new cyber-technologies. As the matter was brought
home to them when the actual capacities of man were shown to the angels, the need to
address the benefits inherent in the modern Information and Communication Technology
(ICT) becomes imperative as well. The knowledge of Islam which commenced in the
Prophets mosque and was transmitted to recipients in Africa under the shade of trees is later
received in schools, colleges and libraries. In the 21
st
century a rapid means of reaching the
world and an effective means of information dissemination is through the Information and
Communication Technology. The big questions then are what are the challenges of ICT to
Islamic Studies? What are the new opportunities offered by the ICT in the field of Quran,
Hadith, Fiqh, and Sirah? To what extent are Islamic Studies teachers availing themselves
with these opportunities? How are they going to face the challenges posed by this new
development? An exploration into this paper will proffer solution to these research questions.
Useful suggestions will be offered on how best the opportunities could be maximally utilised
to facilitate effective teaching of Islamic Studies in our educational institutions.
Introduction
The susceptibility of the ICT to all sorts of evils and unwanted information is as a
result of its democratic nature which makes all Dick and Harry to upload and download
whatever they wish into and from it. The problem is compounded by its not being censored
before making such available to the world. The presence of obnoxious websites where nude
and sex pictures are displayed and users have unlimited access to them with a mere click of
the mouse and keyboard of the computer confirms this assertion. The ICT has therefore
become an instrument of pornography, obscenity, homosexuality and lewdness. Some
teenagers have gone to the extent of downloading such pictures in to their handset to have
unrestricted access to them at any point in time. Web Dating is another phenomenon of ICT
usage among youths. This is done by public display of pictures and profiles of prospective
males and females on the website for easy access of prospective daters. This relationship at
times leads to disappointment, deceit, illicit sexual affairs and divorce. Oloyede (2007) has
equally asserted that the use of telephone text messages, programmable calculators, opaque
jottings, Bluetooth computer facilities and the like, has made ICT a facility for advance
cheating in examinations. There was also an instance where Diann Baecker, an Assistant
Professor at Virginia State University in Petersburg discovered a student to have taken a
picture of his neighbours essay with his camera-equipped phone and then copied the answer
onto his own tests using the image on the phones screen (Marlon, 2004).
The vulnerability of ICT as it affects Islam and Islamic Studies could not be over
emphasised as well. It has become a good source of distortion of facts about Islam and so a
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 273
quick means of disseminating wrong information about Islam and so a serious threat to the
teaching and learning Islam through this medium. Abubakar Kawu (2009:128) identified a
suralikeit website which produced four fabricated suwar in Arabic, English and
transliterated formats entitled Surah al-Iman, Surah at-Tajassud, surah al-Muslimoon and
Surah al-Wasiya where verses inimical to Islamic teachings were displayed. He also cited
another scholar who discovered some strange version of the Quran on the internet, and even
cited some websites like www.answering-islam.com; www.aboutislam.com;
www.allahassurance.com and www.thequran.com, as few examples of websites with un-
Islamic teachings. In the same vein, Oladimeji (2009: 228) also identified some websites
which disseminate wrong information about Islam. Such include www.maarifatuAllah.com;
www.imambaihaqi.com; and www.qaradawi.com as against http://www.qaradawi.net which
he classified among websites developed to disseminate Islamic knowledge. The
http://www.submission.org/women/Faq8 also contains wrong information on the stand of
Islam on a menstruating woman and her observance of her religious rituals like salat, sawm
and hajj, as well as on women dress code and other related issues like polygamy, equality of
men and women and women as leaders.
The sum-total of this is that much has been written
on the vulnerability of the contemporary information and communication technology as it
affects the religion of Islam. However, it will be short-sighted of us to close our eyes at the
usefulness of this medium to Islamic Studies. It is on this basis that we shall consider the
opportunities and challenges offered by the cyber technologies to Islamic Studies with
particular reference to Nigeria.
Conceptual Clarification
Information and Communication Technology
The Information Technology Association of America (ITAA) defines ICT as the
study, design, development, implementation, support or management of computer-based
information systems particularly software applications and computer hardware (see
http//www.ask.com). By implication, ICT possesses the characteristics of processing,
transmitting, manipulating and retrieving various forms of information, with speed and
accuracy, through the use of such tools as television, computer and internet, Satellites,
telephone and other electronic media.
Patterson cited by Saba (2007:220) identified some modern technologies useful for
processing, transmitting, manipulating and retrieving various forms of information. These
include:
a. Data communication on the transmission of Digital Data
b. Tele-communication or communication using wired and wireless Telephone
c. Semi-conductor electronic which deploys the logic functions in integrated
circuits-chips as hard wares components
d. Computers which are programmed electronic machines and
e. Soft wares which allow computer to function according to predetermined
instructions.
Cyber-Space
Space is described as the region beyond the earths atmosphere or beyond the solar
system. Siddiqui (2008:30) considers the complexity of the space phenomena as being
permeated by gravitational field and wide spectrum of electromagnetic fields of unknown
intensities and distributions. Apart from the fact that the Quran enjoins man to penetrate the
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 274
space of the heavens and the earth (Q55:33), it also gives the possibility of opening a gate
from the heavens for man to ascend (Q15:14-15). In reality, the advent of high altitude of
sounding rockets and the instrumented satellites along with high speed digital computers
confirms this possibility. That was when the former Soviet Union launched the first worlds
first satellite (Sputnik 1) on October 4. 1957. This was closely followed by the launching of
two Satellites (Explorer 1 and Vanguard 1) on January 31
st
and March 17 in 1958
respectively by the National Aeronautics and Space Administration (NASA) established by
the United States of America. These discoveries as well as space flights which were later
launched by the USSR and the United States in 1961 thus became a vital instrument of
ascending the sky.
Cyber according to the Advanced Learners Dictionary is the science of
communication and control in machines; while cyber-space is considered as an imaginary
place where electronic messages, pictures etc exist while they are being sent between
computers. Cyber-space therefore, is the online world of computer networks through which
the entire world is linked and adequate information is collected and disseminated.
Islamic Studies
Islamic Studies is a teaching subject in the school curriculum of every ladder of
education in Nigeria. It is a compression of the teaching and learning aspects of the Quran,
Hadith, fiqh, sirah, and tahdib at the Junior Secondary school division (Basic Classes 7-9).In
the Nigeria National Curriculum of Islamic Studies prepared under the auspices of this body,
the Junior Secondary School Curriculum is divided into three parts, namely:
Section A: - The Quran and Hadith
Section B: - Tawhid and Fiqh
Section C: - Sirah and Tahdib
At the Senior Secondary School level, the curriculum is divided into the following sections:
Paper 1:- Hidayah (Guidance) comprising the Quran, the Hadith and Tahdib
(Moral Education based on the Quran and Hadith).
Paper 2:- Fiqh (Islamic Jurisprudence) comprising Tawhid (Faith), Ibadah
(Worship) and Mu
c
amalat (Human Transactions); and
Paper 3:- Tarikh (Historical development of Islam) comprising sirah (The life of
the Prophet and the leadership of the four orthodox Caliphs; the spread
of Islam to West Africa and contributions of Muslims to world
civilization). (National Curriculum for Senior Secondary Schools,
vol.7, 1985).
If Talibs (2004:22) assertion that technology has reached the apex of helping teachers to
teach, is something to go by, then teachers of Islamic Studies have no option than to live up
to expectation in making use of the modern information and communication technologies to
enhance their teaching in a more sophisticated manner. The use of ICT can assist in searching
for information and its dissemination on each of the aspects of Islamic Studies.
Limitation of the Study
In view of the fact that the tools for information and communication technologies are
inexhaustible, we restrict ourselves to the following for proper attention and prompt
reference:
i. Internet:- for its dynamism, constant review of information contained therein,
easy accessibility and provision of Internet Search Engines (ISEs) which can
be used to find useful information. In spite of these opportunities offered by
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 275
the Internet, it also poses problem of filtering from the exhaustive large data as
well as duplication of information which can be at times confusing, as
information retrieved from a particular ISE could also be retrieved from others
(Ismail and Sarif, 2007: 135).
ii. CD/DVD ROMs:- In view of the fact that Internet facilities are yet to be
available in many parts of the country, CD or DVD ROMs therefore provide
an alternative storage and delivery mechanism.
iii. Satellite Television Channels:- These provide opportunity for first-hand live
information on aspects of Islamic Studies being relayed by various Satellite
Television channels like Iqraa TV Channel and Almajid 9 TV to mention but a
few.
Opportunities for Islamic Studies In ICT World
i. Source of Islamic Information
The importance of knowledge seeking can not be over-emphasised in Islam. Right
from the inception of man, Allah had taught Adam the nature of all things. With this he was
ranked high even above the angels and so commanded respect before them. The knowledge
endowed to Adam was a prerequisite for his qualification as a vicegerent of Allah on earth, as
Allah Himself is al-Alim and al-Allam. With the prophethood of Muhammad (s.a.w), he too
was asked to read, which by implication is not mere reading of what was presented to him by
the angel (as he could neither read nor write then), but to also read the book of creation.
To demonstrate that Muslims are not restricted to reading the book of revelation alone, the
Prophet regarded knowledge as a stray camel of the Muslims which must be taken wherever
it is found. He also urged them to extend the scope of their knowledge by seeking knowledge
even if it would take them to China. China was a far place to Arabian land that it could not be
reached easily by then. A quick means of reaching China and even beyond now is through the
use of the modern information and communication technologies and from which knowledge
could be sought. Thus the challenges of seeking knowledge from far distance are taken care
of by the modern ICT. The Internet Search Engines (ISEs) are the tools for finding useful
information from the Internet. Oloyede (2009: 93) has a list of more than twenty of these
search engines, while a description of some of them was given by Ismail and Sarif (2007).
Through any of these ISEs, websites on Islam could be accessed for useful information. A list
of more than forty of these Islamic websites has been documented by Abdulsalami (2008: 52-
54). Through these websites useful information could be downloaded.
It is interesting to note that prominent books on fiqh like al-fatawa alfiqhiyyah al-
kubra, al-fatawa al-hindiyah, al-Turuq al-hukmiya, al-ahkam al-Sultaniyah, Fi zilal al-
Quran of Sayyid Qutb and many others are readily available online for easy accessibility (see
www.al-islam.com). Also, the use of e-mail for retrieving useful knowledge is also a great
opportunity fro Islamic Studies in the contemporary period. Through e-mail, correspondences
are facilitated as it allows for instant questions and answers. Thus, users interact, share and
seek latest information about Islam over the web. In the same vein, the chatislam provides
electronic chatting in form of newsgroups and multi-user domain or the Internet Relay Chat
(IRC) which assists in opening up a discussion by posting a message, while responses and
reactions to the discussion is made by the recipients.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 276
ii. Preservation of Islamic knowledge
Preservation of divine and prophetic messages has been the concern of the Muslims right
form the time of the Prophet. He (the Prophet) was a prominent figure in the work of
preservation of the Quran. The Rightly-Guided caliphs also did their best in preserving the
Holy Scripture. Abubakr was credited for guarding the Quran against the interpolation of the
semi-prophets like Musaylimah who claimed to have received his own shallow and fake
message from one angel Rahman. The task of preserving the sayings and deeds of the Prophet
was carried out during the tenure of Umar ibn Abdul-Aziz.
In the contemporary period, ICT is a veritable instrument of preserving the message of
Islam. Some software on Quran and hadith such as Alim for Windows containing the
Arabic texts, translation and commentary of the Quran; the Sahih Bukhari and other Islamic
books are preserved and made available for scholars to access. The Mausu
c
at kutubi Tis
c
ah is
also a CD plate where nine works of Hadith literature are stored.
iii. Dissemination of Islamic knowledge
The task of seeking knowledge is incomplete if it is not followed by dissemination of the
knowledge to others and even the future generations. Towards the tail end of his prophetic
mission, the Prophet enjoined those who were with him to take his message to those who
were not present there. A quick means of taking Islamic message to the grassroots is the
modern ICT gadgets. Many write-ups can now be easily uploaded for interested people to
download. The Harf Information Technology (www.harf.com) has many Islamic materials
like the Holy Quran with numerous interpretations, thousands of Prophetic Traditions as
well as many classical books of Islamic jurisprudence worth more than 750,000 pages.
Many Muslim organizations are also making use of these modern methods to disseminate
Islamic message to the people through e-mail messages, chatting and development of
websites. The invention of video, VCD (Video Compact Disc), DVD (Digital Video Disc)
and Mp3 greatly assists in taking Islamic message to the grassroots. Various satellite
television channels are also used for carrying Islamic message to all parts of the world. Such
channels as al-Jazeerah, Almajd 9, Huda Channel, Iqra Channel and many more are
specifically provided for disseminating Islamic messages. In short, ICT has become a
veritable tool for effective dawah.
iv. Mathematical Calculation
Mathematics is no doubt a means of capturing the Law of Allah in operational terms
hence a process through which some religious rituals could be adequately observed. It is
highly demanding in the scientific understanding of the lunar calendar which is a prerequisite
for observance of annual Ramadan fasting, pilgrimage and other religious ceremonies. Even
the five daily prayers require scientific understanding of movement of the sun for fixing the
time of the prayers in various parts of the world. The laws of inheritance, and calculation of
zakat equally require considerable knowledge of Mathematics. It is therefore interesting to
note that the modern ICT has lessened the task of some of these religious calculations.
Numerous Islamic websites now have column for the time of salat in different parts of the
world. Interestingly also, the islamcity.com has developed a page for correct calculation of
zakat with information on nisab. In order to calculate zakat, one only needs to fill the cash on
hand and in bank accounts, refundable deposits (like rented apartment), non-delinquent loans,
expected tax refund, and other necessary information. If the zakat amount is 0, then no zakat
is due. In short, zakat can now be calculated using the modern ICT without stress. In addition
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 277
to this, the Hisabul Mawarith which is a programme designed for instant calculation and
distribution of inheritance according to the Shariah has also been developed.
Challenges of Islamic Studies in the World of Cyber Space
O company of jinn and mankind, if you are able to pass beyond the
regions of the heavens and the earth, then pass. You will not pass
except by authority (from Allah). So which of the favours of your Lord
would you deny? (Q55:33-34)
The above Quranic verses do not only confirm the limitless opportunity given to man
to harness and explore the space, but also a strong indication that the discovery of Allahs
creation and making use of this for the development of humankind as a religious duty. In
essence, the discovery of ICT is no doubt a commendable effort which deserves
acknowledgement just like the angels acknowledged the erudition of Adam. If Allah has
clearly mentioned it that He had subjected all that is in the heavens and on the earth to
mankind, (Q45:13; 31:20), then seeking scientific and technological knowledge for the
purpose of understanding this better becomes a pertinent challenge for every Muslim.
It is interesting to note that the Quran gives a clear demonstration of how the space
was subjected to the use of man in its narration of the story of Prophet Sulayman. Apart from
the fact that the Quranic story of Prophets Sulaymans hoopoe demonstrated a means of
communication, Sulayman was endowed with the shortening of geographical distance and the
power to subject the wind and to flow gently to his order. Adebayo (2005:124) has equally
asserted that the consequent acceptance of Islam by Balqis and her recognition of Sulaymans
supremacy as a king were instances of the homogenization and hegemonization syndrome of
globalization. Therefore, it becomes a challenge for scholars of Islamic Studies to acquire
scientific knowledge so as to pave way for their better understanding of the verses of the
Quran. We therefore concur with the suggestion of Oloyede (2004: 26-28) that many
fundamental adjustments needed to be effected in the content and methodology of the
discipline of Islamic Studies in the light of constant changing challenges posed by
materialism, secularism and exploitation which are the irresistible instrument for the
domination of the contemporary world. In the light of this, teachers of Islamic Studies are
expected to be abreast of the modern technological advancement so that their methods of
teaching are improved upon. On this basis, some challenges of Islamic Studies in the
contemporary Information and Communication Technology are hereby considered.
i. Challenge for Moon sighting
In spite of the technological advancement in the contemporary world however,
Muslims are still wobbling amidst incompatible and divergent views on the sighting of the
crescent which is crucial to the commencement and termination of the annual Ramadan fast.
The case has gone so deteriorating in Nigeria to the extent that a gap of two or three days
does exist among them in the time of commencement and termination of the fasting. Akanni
(2003: 345) has rightly identified the division of the Muslim community into factions as far
as the commencement and termination of the fast is concerned in Nigeria. These are: (i) a
group which based its fasting on individual communitys independent sighting of the
appearance of the new moon; (b) a group which holds that its appearance and sighting
elsewhere in the world makes the fast compulsory; (c) a group which believes that all and
sundry must sight the moon before commencing the fast; and (d) a group which agrees on a
fixed date based on available astrological data without waiting for sighting of the moon. The
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 278
case is so pathetic to the level of observance of Idul-kabir on Arafat day in some part of
Nigeria.
We however believe that the modern Information and Communication Technology
can bail out the Muslims from this global mess which does not spare even Saudi Arabia. The
ICT can effectively be used to disseminate information about the sighting of the moon to the
rest part of the Muslim world, and it will become binding on them to commence fasting. The
fact that the Prophet accepted the news of the visibility of the new moon brought by a
Bedouin after confirming his faith is a pointer to this. This was equally the stand of the
Rightly-Guided Caliphs. The Maliki, Hanafi and Hanbali Schools of Thought make it
obligatory for all areas where the news of sighting the new moon reaches to observe the fast.
If that is the case, we sincerely uphold that the exploitation of the information technology
could be harnessed for dissemination of the news of the moon visibility for the purpose of
uniformity.
ii. Challenge of spreading wrong information
Another serious challenge of ICT is the opportunities it offers to some whose only
intention is to paint Islam black to the world using the instrumentality of ICT. There is no
doubt that information from this source could be taken to be authentic by researchers who are
not well grounded in Islam. It therefore becomes imperative to censor information retrieved
from the internet in the perspective of Islam. Websites which carry wrong information about
Islam should be detected on time, and such should be exposed to the world through the
internet as well.
iii. The Challenge of distortion of information
Another challenge is the fact that not all ICT experts are learned in Islam. Some who
are not expert in any field of Islamic Studies rely on their little knowledge of Islam and use
the opportunity of their knowledge in ICT to develop software to post on the net what they
feel is adequate. The democratic nature of this medium which allows for all Dick and Harry
to develop or upload information on the internet makes it dangerous to rely on information
from this source.
iv. The Challenge of cyber crime
There is no denying the fact that cyber crime is a major threat to the contemporary
information and communication technology as it is being used for serious socio-economic
and religious crimes. Apart from the fact that it has become a forum through which numerous
crimes are committed, it has become a stumbling block for observance of the daily obligatory
prayers at the right time, as many are grossly involved in it at the expense of the time of
prayers. Night browsing on the net has also come to replace the Prophetic recommended
Qiyam layl or tahajjud. It therefore becomes a challenge for every Muslim to inculcate the
spirit of Islam in adhering strictly to the principle of Islamic ethical values to guard against
cyber crime, and to uphold the Islamic teaching on timely observance of salat and other
Prophetic teachings.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 279
Recommendations and Conclusion
The problem of Muslims in the whole world is their late acceptance of what they
believe was not practiced by the Prophet and his early companions regardless of the
imperative of such to their religion. They thus stress the negative aspects of such a thing
closing their eyes at the positive aspects. The inadequacy of instructional technologists
among Muslims both in the realms of hardware and software might be due to their lateness in
accepting the contemporary Information and Communication Technology. To check this, a
paradigm shift from traditional to information revolution systemic thinking becomes
imperative for the Muslim world. Numerous Islamic websites in vogue should also endeavour
to update information on them so that they dont live in the past. Series of workshops on
Information technologies from a broader Islamic perspective will also assist in improving the
performance of Muslims in this field. Finally, we recommend that series of collaborative
works between Muslim jurists and Technologists and between Departments of Islamic
Studies and Information and Communication Technology will help much in bridging the gaps
between the two groups. Private Islamic universities and other institutions should mount
diploma courses in Islamic Studies for Information and Communication technologists to
undertake, while diploma courses in ICT are also undertaken by specialists in Islamic Studies
for them to obtain necessary knowledge in the field. Upon all, it will be a thing of joy if one
day Nigeria should have a private Islamic University of Technology where courses offered
will be properly given Islamic touch and students would be exposed to the rigours of ICT. In
conclusion, we strongly opine that a complete overhauling of the curriculum of modern
Islamic schools and madrasah to incorporate the modern ICT becomes highly imperative to
allow their products to compete favourably with modern day development.
Bibliography
Abubakar Kawu, H (2009), Islamic Studies and the Challenges of Information and
Communication Technology (ICT); in Y.O. Imam (ed), Public Administration and
Information and Communication Technology (ICT) Through the Lenses of Arabic and
Islamic Studies. NATAIS.
Abdulsalami, D.O. (2008), The Use and Abuse of Websites on Islam. An unpublished
Masters Dissertation of the Department of Religions, University of Ilorin.
Adebayo, R.I. (2005) The Islamization of Knowledge and the Challenges of Contemporary
Globalization Al-Ijtihad- The Journal of the Islamization of knowledge and
Contemporary Issues. Vol.6, No.2.
Akanni, A.A. (2003), Science in the Service of Theology: A Case Study of the Moon
Sighting in Islam; in Dopamu, Ade P. (et.al) (Eds), African Culture, Modern Science
and Religious Thought; University of Ilorin, African Centre for Religions and the
Science (ACRS).
Federal Ministry of Education, (1985), National Curriculum for Senior Secondary Schools,
vol.7, n.p.
Ismail, Y and Sarif S.M (2007), The Coverage of Islamic Management Materials in the
Internet Search Engines. Proceedings of Inaugural International Conference on
Management from Islamic Perspectives, held between 15 &16 May, 2007 at Hilton
Kuala Lumpur, Malaysia.
Marlon, A. Walker (2004), High-Tech Cribbing: Camera Phones Boost Cheating, The Wall
Street Journal, September 10, .P.B1 http://online.wsj.com/article/0
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 280
Oladimeji, L.F (2009), Utilizing Information and Communication Technology (ICT) in the
Teaching of Fiqh (Islamic Jurisprudence) in Akintola, Is-haq et.al (eds) Correlates of
Islam; Zaria, Ahmadu Bello University Press.
Oloyede,I.O (2004), The Place of Arabic and Islamic Studies in a Globalized Nation.
NATAIS Journal of the Nigeria Association of Teachers of Arabic and Islamic
Studies, Vol.7.Sept.
Oloyede, I.O. (2007), Confronting Environmental Issues in Examination Malpractice in
Nigeria: Societal and Professional Support. A Presentation at the Summit on
Improving Education with focus on Examination malpractices in Nigeria, organized
by House Committee on Education; (House of Representatives, Federal Republic of
Nigeria) on 15
th
August 2007 at Yaradua Centre, Abuja.
Saba, M. Daniel, (2007), The Role of Information Technology in Promoting Religion as an
Instrument of Peace in Nigeria in Folorunsho, M.A, Oyeneye, I.O. & Adebayo, R.I.
(eds), Religion and Modernity; National Association for the Study of Religions and
Education (NASRED).
Siddiqui, A.W. (2008), Threatened Global Information; The Muslim World League
Journal; vol. 36, no. 5.
Talib, M. (2004), Technical Approach in Graphical Study of Calculus Using Maple and
Animation. Information Technologists: An International Journal of ICT in Nigeria,
vol.2, No. 1.
Women in Islam (submission) from http://www.submission.org/women/faq8/html
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 281
E-DAGANG: KAJIAN ANALISIS MODEL PERNIAGAAN E-DAGANG DAN
KEKANGAN DALAM PERLAKSANAAN E-DAGANG MENURUT PERSEPSI DAN
PENERIMAAN SYARIAH ISLAM
Rafiza Binti Kasbun
Kuala Lumpur International University College
rafiza@kliuc.edu.my
Abstrak
Kertas kerja ini membentangkan tentang kajian atau analisis yang dijalankan terhadap model
perniagaan atas talian (e-dagang) dan kekangan perlaksanaan e-dagang menurut persepsi dan
penerimaan dalam syariah Islam. Internet merupakan satu alat untuk memperkembangkan
lagi perniagaan pada hari ini. Kepelbagaian model perniagaan e-dagang hari ini menyebabkan
ramai pelanggan pada hari ini lebih selesa untuk melakukan pembelian produk barangan,
perkhidmatan dan pelaburan melalui Internet. Para pelanggan dan peniaga di Malaysia
khususnya telah bertumpu lebih masa pada capaian Internet berbanding media tradisional
seperti suratkhabar, televisyen, brosur, radio dan lain-lain Walau bagaimanapun, sejauh mana
seseorang individu samada peniaga atau pelanggan sedar dengan setiap transaksi pembelian
dan jualan yang dilakukan itu adalah sah samada halal, harus, makruh atau haram dari segi
undang-undang Islam menjadi tujuan utama kajian ini diketengahkan. Kajian ini tertumpu
kepada isu model perniagaan e-dagang, transaksi e-dagang, ciri-ciri perniagaan e-dagang, dan
kesahihan e-dagang pada pandangan undang-undang Islam. Isu e-dagang dalam perspektif
Islam ini agak terhad di seluruh dunia menyebabkan kajian analisis ini cuba
diperkembangkan lagi mungkin dengan pendekatan yang lebih agresif pada masa akan
datang.
Pengenalan
Jelas sekali, pada masa kini dan akan datang, teknologi makin menguasai manusia samada
dari segi keperluan mahupun kehendak. IT antara teknologi yang sememangnya diperlukan
oleh hampir setiap individu untuk melaksanakan urusan harian dengan mudah dan
menjimatkan. Semestinya juga umat Islam tidak tertinggal dalam menerajui dan terlibat
dalam penggunaan IT di mana ia telah mengubah ke satu transisi masyarakat berdasarkan
Internet.
Internet telah mengubah cara manusia bersosial, berniaga, bekerja dan lain-lain. Kesan yang
paling besar adalah pada cara manusia berniaga di Internet iaitu yang lebih dikenali sebagai
Elektronik Dagang (E-dagang). E-dagang secara umumnya bermaksud aktiviti pembelian,
jualan, pertukaran samada barang dagangan, perkhidmatan dan maklumat melalui media
elektronik. E-dagang pula terbahagi kepada beberapa klasifikasi perniagaan berdasarkan
bentuk transaksi yang dilaksanakan seperti B2B, B2C, B2B2C, C2B, C2C, M-dagang, L-
dagang, B2E, C-dagang, E-kerajaan,dan E2E. Namun dalam kajian ini, analisis hanya
tertumpu kepada klasifikasi B2C, C2C, dan C2B sahaja.
Walaupun e-dagang telah berkembang sepenuhnya di seluruh dunia, namun ramai di antara
umat Islam yang tidak peka dan tidak tahu tentang status transaksi yang dilakukan menurut
perspektif dan undang-undang Islam. Di Malaysia khususnya, hanya terdapat beberapa jurnal
atau penulisan berkaitan isu perdagangan elektronik ini yang diketengahkan. Kajian terhadap
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 282
perniagaan elektronik sememangnya amat diperlukan (Amin, 2008). Kebanyakan kajian
dijalankan adalah berdasarkan penerimaan terhadap perbankan elektronik berbanding kajian
terhadap perdagangan elektronik menurut perspektif Islam (Polatoglu & Ekin, 2001; Al-
Ashban & Burney, 2001; Howcroft et al., 2002; Sureshchandar et al., 2003). Di Malaysia
pula kajian hanya banyak tertumpu kepada perdagangan elektronik dari perspektif perbankan
(Guriting & Ndubisi, 2006; Sulaiman et al., 2005; Ramayah et al., 2003; Guru et al., 2000).
Oleh itu, boleh disimpulkan bahawa kajian terhadap elektronik dagang menurut perspektif
Islam masih samar-samar dan tiada keperincian.
Kertas penyelidikan ini bertujuan untuk mendalami isu e-dagang dalam memenuhi syariah
Islam. Pengkhususan kajian adalah pada jenis model perniagaan yang boleh dan tidak
dibenarkan dalam Islam, jenis transaksi yang dilakukan, dan juga peranan pembeli dan
penjual dalam perlaksanaan e-dagang. Kajian ini juga diharap dapat dimanfaatkan semua
umat Islam di dunia khususnya di Malaysia dalam memastikan transaksi perniagaan e-dagang
benar-benar memenuhi syariat Islam agar kehidupan sentiasa dalam keberkatanNya.
Bahagian 2 kertas kerja ini khusus membincangkan jenis model perdagangan Internet yang
ada pada hari ini, transaksi e-dagang yang digunakan, dan peranan pembeli dan peniaga e-
dagang di Malaysia. Bahagian 3 merumuskan permasalahan dalam pengimplementasian e-
dagang menurut perundangan Islam. Persoalan Kajian pula dibincangkan dalam bahagian 4.
Bahagian ke 5 pula membincangkan tentang metodologi kajian. Bahagian 6 menjelaskan
jadual perlaksanaan kajian. Manakala bahagian terakhir merumuskan keseluruhan hasil kertas
kerja, implikasi kajian dan diikuti dengan senarai rujukan untuk kajian ini.
Perkembangan Elektronik Dagang di Malaysia
Malaysia tidak terkecuali dalam menggunakan sepenuhnya kemudahan Internet dalam
memperkembangkan perniagaan sesebuah syarikat. Menteri Perdagangan Dalam Negeri,
Koperasi & Kepenggunaan iaitu YB Dato Seri Ismail Sabri Yaakob telah mengumumkan
bahawa beberapa perubahan akan dilakukan kepada Akta E-Dagang Malaysia di dalam
pembentangannya pada bulan Mac tahun 2010 ini. Malaysia mempunyai satu akta yang
digunapakai untuk melindungi hak pengguna yang melakukan transaksi secara atas talian di
Malaysia dikenali sebagai Akta E-Dagang. Sebelum ini, terdapat beberapa kekurangan di
dalam akta tersebut yang menyebabkan hak pengguna yang telah membeli barangan
elektronik secara atas talian tidak terjamin. Oleh itu, perubahan baru ini akan membantu
melindungi hak pembeli dan penjual yang melakukan transaksi secara elektronik. Terutama
sekali untuk penjualan dan pembelian produk-produk elektronik.
Menurut YB Dato Seri Ismail, ada perubahan di dalam akta tersebut yang memerlukan
penjual yang menjual secara atas talian memiliki syarikat perniagaan yang sah dan berdaftar.
Beliau tidak menyatakan sama ada pendaftaran perniagaan ini melibatkan semua pihak yang
menjual secara atas talian tanpa mengira jenis barangan atau hanya tertumpu kepada penjual
yang menjual produk-produk elektronik sahaja. Perubahan baru ini akan memberikan kesan
yang besar kepada semua penjual yang menjual secara atas talian di laman web sendiri,
laman blog, eBay atau pun Lelong.com.my. Belum ada lagi maklumat sama ada penjual-
penjual yang menjual produk elektronik di Lelong atau eBay akan terpaksa menuruti akta
terbaru ini (Eruwan, 2009). Ini jelas menyatakan bahawa elektronik dagang di Malaysia
berkembang dengan amat pesat dan pantas memandangkan Akta E-Dagang senantiasa
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 283
memerlukan perubahan dan penelitian. Usaha ini semestinya untuk menjamin kesejahteraan
peniaga dan pembeli.
Peningkatan golongan intelek muda yang taksub dan sentiasa memerlukan capaian Internet
menyebabkan mereka antara sasaran paling tepat dalam pemasaran Internet.
Hanudin (2008) dalam hasil penulisannya menyatakan ada tiga sebab Internet menjadi satu
keperluan dalam masyarakat iaitu yang pertama Internet merupakan perpustakaan
mendapatkan apa jenis maklumat skelaipun. Kedua pula Internet menyediakan transaksi yang
interaktif seperti pembelajaran dan pengajaran. Manakala yang ketiga pula ialah teknologi
perkomputeran membantu dalam memperkembangkan perdagangan elektronik dalam
muamalah Islam itu sendiri.
Jadual 4: Pengguna Internet (setiap 1,000 orang) di Malaysia
Tahun 2001 2002 2003 2004 2005 2006
Number 27 32 35 39 43 43
Sumber: World Bank
Namun dalam keghairahan Internet dan e-dagang ini, manusia amnya dan umat Islam
khususnya sering lupa akan garis halal dan haram dalam muamalat Islam. Irfan Khairi (2008)
dalam penulisannya menyatakan bahawa Dr. Hj. Fadzilah Kamsah pernah mengeluarkan
kenyataan bahawa umat Islam sememangnya disarankan hidup bersederhana di mana konsep
sederhana itu adalah bermaksud seimbang samada hal duniawi mahupun akhirat. Jika
kekayaan yang dicari dengan cara yang bersungguh-sungguh dan menepati garis panduan
Islam, seseorang itu layak menerima kekayaan tersebut dengan syarat ia mempertimbangkan
kesemua elemen sekeliling seperti kebajikan keluarga, masyarakat, dan agama. Oleh itu,
tidak salah jika Internet digunapakai sebagai satu peralatan atau media menjana kekayaan
iaitu melalui perniagaan atas talian selagi ia tidak melampaui batas syariah Islam.
2.1 Penjanaan Wang Di Internet
Secara keseluruhannya, terdapat 3 kaedah membuat duit atau erti kata lain kekayaan di
Internet di Malaysia khususnya, iaitu perniagaan Internet, program Internet, dan pelaburan
Internet. Konsep perniagaan Internet tidak jauh bezanya dengan konsep perniagaan
konvensional. Perniagaan Internet diklasifikasikan kepada 2 bentuk iaitu produk atau
perkhidmatan. Apa yang berbeza hanyalah pada konsep pembayaran iaitu melalui transaksi
atas talian dan penyerahan barang dalam bentuk muat turun atau pengeposan. Transaksi
pula samada melalui auto debit akaun bank, kad kredit mahupun pihak ketiga seperti Paypal,
e-cash dan sebagainya. Perniagaan Internet selalunya memang wujud dan benar (tiada
penipuan). Jika ada yang menipu sekalipun, jumlahnya minimum (Wangcyber, 2007). Walau
bagaimanapun, perniagaan Internet memerlukan usaha dalam kaedah pemasaran Internet,
kaedah dapatan trafik dan lain-lain lagi.
Program Internet pula lebih mudah dilakukan berbanding perniagaan Internet. Ia boleh
dikategorikan kepada beberapa jenis seperti program pengiklanan, program affiliate, Internet
MLM, Get Paid To Program, Randomizer, Em-Pay dan Forced Matrix. Pelaburan Internet
merupakan antara kaedah membuat duit yang paling digemari rakyat Malaysia. Terdapat 3
jenis yang diketahui iaitu High Yield Investment Program (HYIP), pelaburan Forex dan
Swiss Cash dan pelaburan sahan di Bursa Malaysia menerusi Internet. Konsep letak duit
kemudian dapat duit berganda inilah yang telah difatwakan haram oleh Majlis Fatwa
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 284
Kebangsaan pada April 2007. Konsep ini dikenali sebagai Skim Cepat Kaya Alaf Baru. HYIP
adalah yang paling berbahaya dari segi hukum syariah kerana tiada ketelusan urusniaga.
Forex dan Swiss Cash pula berisiko tinggi kerana banyak laman web broker adalah Scam dan
tidak berlesen. Tetapi bagi pelaburan saham di Bursa Malaysia boleh dikatakan selamat untuk
melabur kerana urusniaganya diiktiraf Bank Negara Malaysia.
Pernyataan Masalah
Setelah melihat secara menyeluruh jenis model perdagangan Internet di bahagian 2.1,
terdapat beberapa masalah yang boleh diketengahkan jika ianya dikaitkan dengan etika
perniagaan dalam Islam. Ia merangkumi aspek penjualan, pembelian, pelaburan, pembayaran,
penghantaran dan penerimaan barang, dan juga hak peniaga dan pembeli.
Jika dilihat dari sudut syariah Islam, Islam menganjurkan beberapa panduan atau tatacara
dalam perniagaan. Kebenaran, keikhlasan, dan kejujuran merupakan nilai etika utama dalam
perniagaan Islam (Norazlina, Fauziah, Siti Hartini, 2004). Memandangkan E-dagang
dilaksanakan menggunakan komputer dan rangkaian, beberapa keadaan perlu diperhatikan
untuk mengesahkan kesahihannya dalam Islam. Pertama, ketelusan dalam komunikasi dan
produk yang ditawarkan, manakala yang kedua, pihak peniaga dan pembeli mesti mencapai
persetujuan yang sama. Ketiga, pula ialah komunikasi berterusan samada dalam penghantaran
mesej atau khidmat nasihat antara kedua pihak tersebut (Mustafa, 2004). Berdasarkan
syariah, e-dagang hanya sah jika ia memenuhi 4 asas kontrak perniagaan dalam Islam (Al-
Taaqut) iaitu tawaran dan penerimaan, pihak pembeli dan peniaga, hal berkaitan perniagaan
(kewujudan dan cara penghantaran), dan mod ekspresi semasa penjualan dan pembelian.
Selain itu, Mustafa (2004) menyatakan selain Al-Taaqut terdapat 4 lagi perkara yang perlu
dititikberatkan dalam perniagaan e-dagang, iaitu, Sihha, Nafath, Ilzham, dan penghantaran.
Sihha (Pengesahan) perniagaan perlu bebas dari elemen Riba, Gharar (ketidakpastian),
penipuan, paksaan, dan Maisir (perjudian). Dalam Nafath (Pengimplementasian) pula,2
perkara perlu dipastikan iaitu peniaga yang menawarkan produk adalah pemilik barangan
tersebut dan produk tersebut bebas dari sebarang liabiliti. Illzham (Keterikatan)
menitikberatkan persetujuan 2 pihak dalam sebuah kontrak perniagaan. Ini kerana
kebanyakan laman web wujud tetapi realitinya sejauh mana mereka itu benar-benar wujud
dan bagaimana cara membuktikan persetujuan yang telah dicapai dalam kontrak tersebut.
Akhir sekali, penyerahan atau state of exchange juga kritikal kerana ia melibatkan mod
pembayaran dan polisi penerimaan dan pemulangan barang. Mod bayaran dalam bentuk
kredit kad konvensional adalah haram dalam Islam kerana ia melibatkan riba setelah lewat
membuat pembayaran. Alternatif yang lain mungkin kad kredit Islam yang menggunakan
konsep Murabahah dan pembayaran melalui bank (kad debit).
Masalah seperti tidak peka dan tidak peduli masyarakat Islam dalam transaksi hari ini agak
membimbangkan Polisi penerimaan dan pemulangan barang pula adakah jelas atau samar-
samar dalam memelihara hak pembeli setelah menerima produk tersebut. Persoalan seperti
adakah pembeli boleh memulangkan barang dan mendapat semula bayaran yang telah dibuat
sekiranya barang rosak, tidak menepati spesifikasi, dan lain-lain turut penting dalam
memastikan suatu perniagaan itu benar-benar diberkatiNya.
Lagi permasalahan yang didapati adalah seperti produk yang dijual samada ia untuk
memenuhi keperluan dan kehendak atau membantu kepada perbuatan maksiat turut menjadi
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 285
perdebatan dalam e-dagang hari ini. Perniagaan berunsurkan eksploitasi, pemerasan, dan
penganiayaan satu pihak juga wujud pada masa kini di Internet. Walaupun tidak secara
jelasnya berbentuk penganiayaan dan pemerasan berlaku, namun semestinya timbul rasa
sesal, geram dan kecewa pada pihak pembeli seperti contoh dalam pembelian tiket tambang
murah Air Asia di mana jika pembatalan dibuat, duit tidak akan dipulangkan langsung dan
penggantian tarikh, penumpang, dan masa penerbangan juga tidak dibenarkan. Perniagaan
MLM contohnya perlu diselidik sedalamnya sebelum seseorang individu itu menceburkan
diri dalam perkara syubhah. Masih ramai umat Islam di Malaysia sendiri yang tidak faham
akan konsep Riba Nasiah dan Riba Al-Fadl (konsep perniagaan tertumpu kepada berapa
banyak downline yang diperolehi berbanding jualan produk syarikat (Zaharuddin, 2007).
Majlis fatwa Al-Lajnah Ad-Daimah Arab Saudi telah mengharamkan konsep perniagaan
seperti ini. Selain itu, konsep shafqatayn fi shafqah (dua aqad jual beli dalam satu aqad)
juga masih tidak difahami oleh masyarakat kita di Malaysia. Rasulullah SAW melarang dari
membuat 2 belian dalam satu aqad (Riwayat Ahmad, Al-Bazzar; Al-Haithami, 4/84).
Dari huraian di atas, didapati banyak perkara atau isu yang boleh dibangkitkan daripada cara
pengendalian perniagaan atas talian. Walau bagaimanapun, selagi perniagaan tersebut tidak
terlibat dengan perkara-perkara yang bercanggah dengan undang-undang Islam, maka
perniagaan itu dianggap sah dan halal menurut syarak. Ini dijelaskan di dalam al-Quran
(Surah al Baqarah: 275), bermaksud:
Sesungguhnya Allah menghalalkan jualbeli dan mengharamkan riba. Internet hanyalah
merupakan satu alat untuk menjalankan perniagaan tetapi terpulang kepada individu untuk
memahami dan mendalami transaksi yang dilakukan itu sah di sisi prinsip muamalah Islam.
Persoalan Kajian
Secara umumnya, tujuan kajian dan analisis ini dijalankan adalah untuk mengetahui samada
sesebuah jenis perniagaan atas talian atau model perniagaan e-dagang pada hari ini benar-
benar mengikut garis panduan undang-undang Islam bagi membolehkan peniaga dan pembeli
terlibat dalam satu transaksi yang sah dan halal di Malaysia.
Manakala, secara khususnya pula, persoalan terhadap kajian ini adalah untuk mengetahui:-
a) jenis perniagaan, program dan pelaburan Internet bagaimana yang dibenarkan dalam
syarak?
b) masalah atau kekangan umat Islam dalam mengimplementasi e-dagang di Malaysia
berpandukan undang-undang perdagangan Islam.
Dengan persoalan kajian di atas, satu garis panduan yang lebih jelas mungkin dapat
diketengahkan untuk kepentingan tatapan dan pengetahuan umum masyarakat khususnya
umat Islam di Malaysia dalam menjalankan transaksi perniagaan dan pembelian di Internet.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 286
Metodologi Kajian
Beberapa kaedah kajian digunakan dalam menjayakan kajian ini, iaitu:-
5.1 Kaedah Tinjauan
Dalam kaedah ini, tinjauan dilakukan hanya pada pengimplementasian e-dagang di kalangan
masyarakat Malaysia amnya dan umat Islam Malaysia khususnya. Tinjauan dilakukan
menerusi laman web, blog, laman web rangkaian sosial, forum, laman iklan, dan lain-lain
berkaitan. Tinjauan memfokus kepada jenis perniagaan atau model perniagaan e-dagang yang
diminati rakyat Malaysia dan bagaimana konsep pendekatan perniagaan ini dalam mencapai
kepercayaan para pelanggannya. Ini kerana pertambahan penggunaan Internet di Malaysia
secara tidak langsung mengarah kepada peningkatan penggunaan e-dagang juga.
5.2 Kaedah Soal-selidik dan Temubual
Dalam kaedah soal-selidik dan temubual, seramai lebih 800 orang (masyarakat Islam) di
seluruh Malaysia menjadi responden dalam kajian ini. Pemilihan sample pula berdasarkan
kepada stratified random sampling, di mana ia terbahagi kepada 2 kumpulan iaitu
kumpulan pembeli dan kumpulan peniaga Internet. Bahagian ini melihat dengan lebih
terperinci pengalaman responden yang pernah membuat transaksi melalui Internet dan
pengalaman peniaga Internet. Kajian ini menjurus kepada kesedaran mereka terhadap
transaksi Internet menerusi skop perundangan perniagaan Islam.
5.3 Kaedah Temubual
Kerjasama daripada beberapa ahli ilmuwan atau orang berpengalaman dalam bidang
perniagaan Internet dan juga muamalah Islam di Malaysia dirasakan antara yang paling perlu
dalam mendapatkan maklumat yang jelas tentang sistem perniagaan yang dituntut syarak.
Gabungan dua bidang ini dapat membuka skop yang lebih luas tentang e-dagang menurut
persepsi undang-undang Islam.
5.4 Kaedah Pengumpulan Data
Data primer dan data sekunder diperlukan dalam kajian analisis ini. Data primer diperolehi
daripada kaedah soal-selidik, dan temubual. Manakala data sekunder pula merupakan
maklumat-maklumat daripada bahan bacaan dan rujukan samada di perpustakaan, laman web,
akhbar, majalah dan sebagainya. Ia melibatkan kajian-kajian teks, dokumen, kertas kerja,
mikro filem, media massa, dan lain-lain lagi. Dalam contoh mengkaji konsep muamalah
Islam, data yang diperolehi hasil temubual dan soal-selidik adalah data primer. Data yang
diperolehi melalui bacaan ilmiah pula dianggap sebagai data sekunder.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 287
Jadual Perlaksanaan
Kajian ini akan dilaksanakan selama satu tahun (12 bulan) dengan perincian seperti berikut:-
Bil Aktiviti Bulan
1 2 3 4 5 6 7 8 9 10 11 12
1 Persediaan tajuk
2 Pembelajaran berkaitan topik
3 Perincian topik
4 Pengumpulan data sekunder
5 Pengumpulan data primer
6 Penganalisian data primer dan
sekunder
7 Penyusunan draf laporan
pertama
8 Pembentangan laporan pertama
9 Penyusunan draf laporan kedua
10 Pembentangan laporan kedua
11 Penyusunan draf akhir
Rumusan
Hasil kajian analisis ini diharapkan dapat memandu kepada satu garis panduan yang jelas dan
tepat berkenaan perlaksanaan e-dagang mengikut hukum syarak Islam. Isu-isu berkaitan
kesahihan transaksi dalam e-dagang, masalah dan kekangan pengimplemantasian e-dagang,
keselamatan dan privasi, dan perundangan sivil secara amnya menjadi topik hangat e-dagang
hari ini. Namun, sebagai peniaga Islam dan pembeli Islam, seseorang perlu mempunyai ilmu
pengetahuan tentang hukum dan undang-undang perjanjian jual beli yang halal dan bersih.
Kajian juga berharap dapat mengupas lebih mendalam segala jenis kekangan bagi pembeli
amnya dan peniaga khususnya untuk melaksanakan transaksi e-dagang supaya ianya seiring
dengan kehendak syarak.
Implikasi dari kajian ini terbahagi kepada 2 bahagian, iaitu:-
1. Dalam bidang pendidikan dan penyelidikan, hasil analisis kajian ini dapat memberi
satu pendedahan baru berkaitan aspek perundangan Islam dalam perlaksanaan e-
dagang, sekaligus membolehkan ia menjadi titik rujukan untuk kajian pada masa akan
datang. Ia juga menyumbangkan beberapa fakta atau rujukan kepada mana-mana
badan atau organisasi yang berkenaan untuk menjalankan mungkin kajian yang lebih
mendalam dan terperinci tentang topik ini khususnya di Malaysia. Ini kerana kajian
berkaitan topik ini amat terhad didapati di seluruh dunia khususnya negara Islam.
2. Dalm bidang praktikal dan pengimplemantasian pula, hasil kajian dapat membuka
mata para peniaga dan usahawan Islam untuk lebih memahami konsep transaksi dan
muamalah Islam dalam e-dagang. Dengan ini, diharapkan para usahawan Islam di
dalam dunia siber lebih peka dan kreatif dalam mewujudkan satu perniagaan yang
bersih, telus dan halal sepenuhnya di sisi Islam. Perniagaan berkonsepkan muamalah
Islam diakui lebih digemari kerana ketelusan dan kesahihan transaksinya oleh bukan
Islam sekalipun. Maka, semestinya konsep e-dagang mengikut perundangan Islan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 288
turut menjadi konsep yang lebih digemari pada masa kini dan akan datang di seluruh
dunia.
Akhir kata, hasil analisis kajian ini dapat memperkenalkan atau mengetengahkan betapa peri
pentingnya mengimplementasi perniagaan atas talian yang bersih lagi jelas menurut hukum
syarak untuk semua umat Islam di dunia amnya dan Malaysia khasnya. Ia juga dapat
memberi panduan untuk mereka yang mencari keredhaan Allah swt dalam aktiviti seharian
samada dalam pencarian rezeki dan sebagainya.
Rujukan
Norazlina Z., Fauziah O., Siti Hartini M.,(2004) E-Commerce From An Islamic Perspective.
Electronic Commerce Research and Applications 3 (2004) 280-293.
Hanudin A., (2008) E-business From Islamic Perspectives: Prospects and Challenges.
Journal of Internet Banking and Commerce, December 2008, vol. 13, no.3.
Hussin, Dr. Husnayati, (2002) E-Commerce: Exploring Some Issues From the Islamic
Perspectives.
Azhar M., (2009) Transaksi E-Commerce Dalam Tinjauan Hukum Islam. Lembaga
Penelitian Universitas Muhammadiyah Malang.
Dr. Nik Rahim NW., (2009) E-Dagang Menurut Perspektif Islam. Jabatan Syariah, Institut
Pengajian Islam, Universiti Brunei Darussalam.
Nasrul Hisham NM., (2008) Aplikasi Sains Dan Teknologi Dalam Transaksi Muamalah
Islam: Rujukan Kepada Rukun-Rukun Akad Mengikut Perspektif Undang-Undang
Kontrak Islam. Jurnal Teknologi, UTM 49 (E) Dis. 2008: 81-91.
Zaharuddin AR., (2004) Isu Syariah Dalam Perniagaan MLM. Capaian pada 10 Januari
2010, dari World Wide Web: http://www.zaharuddin.net
Ahmad A.F., (2008) Perniagaan Dalam Internet. Capaian pada 10 Januari 2010, dari World
Wide Web: http://ilmudanulamak.blogspot.com/2008/06/mlm-yang-halal-dan-yang-
haram.html.
Abdulrahman A., (2007) The Islamic Concept of Meeting Place and Its Application in E-
Commerce. Masaryk University, Journal of Law and Technology, Vol. 1, No.1, 2007,
ISSN 1802-5943.
Najahudin L., (2009) Sistem Muamalat Islam Patut Jadi Panduan Cari Kekayaan Bukan
Konvensional. Berita Harian, 27 Julai 2009.
Dr. Setiawan B.U., (2009) Hukum Electronic Commerce (E-Commerce). Ekonomi Syariah,
Fiqih Kontemporer.
Zaharuddin A.R., (2009) EM-Pay: Pelaburan Halal Atau Haram? Capaian pada 10 Januari
2010, dari World Wide Web: http://www.zaharuddin.net.
Wangcyber.com., (Mei 2007) Laporan Khas, Kempen Celik Duit Internet. Capaian pada
10 Januari 2010, dari World Wide Web: http://www.wangcyber.com.
Ibrahim Ali A., (2006) E-Commerce And Its Ruling On The Scale Of Sharia And Jurist
Rules. Islamic Economics Collection, International Islamic University Malaysia, October
2006, Doc 5240, Issue 306, Page 13-18.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 289
ANALYZED INTERNET HOTSPOT METRICS USING 3D REPRESENTATION
IN OPEN AREA
Yeffry Handoko
Universitas Komputer Indonesia
Jl. Dipatiukur 112-116 Bandung 40132
yeffryhp@yahoo.com
Abstract
There are many methods to measure WI-FI exposure in open area, almost all the methods
only measure in a few point of area which reveals one fidelity metric such as intensity. If we
want to find out the location of minimum intensity, the area of exposure and the best
exposure in small hotspot internet, the effort should be taken is to plot all measurement points
in 3D or contour mapping. This research is providing 3D mapping of Internet hotspot
exposure in some open area, fidelity analysis about intensity exposure and load and strength
capacity which represented the access speed based on user number. The results of this
research are location of black spot which is represented minimum exposure, load and strength
empiric function and percentile distribution of usage per day.
Keyword: Hotspot, WI-FI, Intensity, Internet
1. Introduction
The intensity received by client in Wi-Fi network is always not consistence according to number of
user, interference and signal attenuation. Wi-Fi network uses IEEE 802.11 technology which is a good
platform actually for single-hop ad hoc network because of its simplicity [1]. In public usage of Wi-Fi
technology like in campus, office, supermarket, restaurant this technology is familiar with the name of
hotspot or WLAN (Wireless Local Area Network).
Theoretically, hotspot as Wi-Fi network is Wireless Internet network which operates at 2,4
GHz band. Recently, hotspot uses standard IEEE 802.11b or 802.11g, which enables transmission at
5.5 Mbps and 11 Mbps. This paper will propose alternative measurement of continuous power
intensity received by client in WLAN and the method of measurement and analysis.
The metrics in Internet defines as the measurable variable which inherently represents the
Internet performance. In Internet knowledge performance analysis, there are some metrics used to be
chosen such as Internet speed (download or upload speed), bandwidth, WLAN intensity of exposure,
and so on.
2. Hotspot Intensity Problem
WLAN transmits its signal by its router hotspot with almost in omni-directional angle of exposure.
The intensity received by client is sometimes not consistent depend on [2]
a. channel has time-varying and asymmetric propagation properties
b. the wireless medium is significantly less reliable and ease to interfere by noise and has attenuate
properties
c. Inconsistencies in bit rate depend on bandwidth and number of user
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 290
The consistency demand sometimes can be neglected and not consider as problem in
hotspot. However, if the inconsistency of bit rate and the decreasing of intensity happen in
particular area or sub area then it will trigger new question about what happen in that
particular area. According to outdoor WLAN exposure beside intensity exposure which
become an attention in this paper, there is also another metrics or variable involved like angle
of exposure, Fresnel distant, and of course the distant itself [3]. Fresnel zone is highly depend
on distant and height of sender to receiver,
3. Experimental Procedures
In this paper, we choose two metrics i.e. Internet download speed and intensity of hotspot.
The experiment is conducted using 4 laptops with the same specification. The four laptops
are placed at hotspot area with different position and each of position is represented as
measurement point (figure 1). At the same time the four laptops as a client in WLAN doing
downloading at the same site. The temporal data then statistically processed and will be
plotted using 3D Mathlab plotting program.
Figure 1. The position of measurement and AP (Access Point)
Software involved in procedure of measurement:
a. To measure intensity exposure which is actually the signal to noise ratio, we used WI-FI
Software called Network Stumbler
b. To measure the bit rate when downloading process occurred, we used FTP(iperf) with
command:
C:\>iperf c <IP address> -u b -11M r i 2
The SNR and bit rate are measured for 12 hours, and represented in rms (root mean
square) value and temporal data. Each measured are sampled for 10 minutes and done in four
laptops simultaneously.
4. Result
The one half daily measurement of SNR in rms values is showed in Figure 2.
Figure 2. SNR rms measure for 12 hours with network stumbler software and plotting with
Matlab.
0
5
10
15
0
5
10
15
-0.5
0
0.5
1
1.5
meter
meter
S
N
R
r
m
s
5 m
5 m
1 2
3 4
AP
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 291
The good intensity exposure of WI-FI is placed at center of area as depicted in Figure 2. The
hat shape of SNR rms in this figure shows that in
5. Conclusion
The intensity of hotspot can be plotted in 3D and can be analyzed further more about the
location which contains minimum SNR or Maximal SNR
References
[1] Anastasi,G., Conti, M., Gregori, E., IEEE 802.11 Ad Hoc Networks: Protocols,
Performance and Open Issues , in Mobile Ad hoc networking, S. Basagni, M. Conti, S.
Giordano, I. Stojmenovic (Editors), IEEE Press and John Wiley and Sons, Inc., New York,
2003.
[2] Gavin Holland, Nitin H. Vaidya Analysis of TCP
Performance over Mobile Ad Hoc Networks, ACM/Kluwer WINET 8(2-3), (2002) pp. 275-
288.
[3] G. Anastasi, E. Borgia, M. Conti, E. Gregori, , IEEE 802.11 Ad Hoc Networks:
Performance Measurements, Cluster Computing Journal, (to appear).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 292
OBJECT-ORIENTED REQUIREMENT ANALYSIS FOR DEVELOPING
MAPPiCXS MIND MAPPING SOFTWARE
Abdurrahman Jalil, Siti Noor Ahmad, Juzlinda Mohd Ghazali,
Farhana Abdullah Asuhaimi, Aisyah Mat Jasin
Faculty of Information Science and Technology
Selangor International Islamic University College
abdurrahman@kuis.edu.my, sitinoor@kuis.edu.my, juzlinda@kuis.edu.my,
farhanaabdullah@kuis.edu.my, aisyahjasin@kuis.edu.my
Abstract
The ability to correctly identify the system requirements is essential to the design and
development of effective software. This paper describes the requirement analysis for the
development of MAPPiCXS mind mapping software. The objective is to capture the
functional requirements which represent the tasks that the system must meet in order to be
successful. This paper applies the object-oriented Unified Software Development Process
(USDP) methodology framework to specify the system basic functionality and logical
internal structure. The use case model produced during this stage is analyzed to identify the
objects that are required to support it. Finally, a class diagram is derived from this analysis to
describe the proposed mind mapping software.
Keywords: Object-oriented methodology, Mind map, Requirement analysis, Use case, Class
diagram
1.0 Introduction
MAPPiCXS is a research project with the purpose of developing a unique mind mapping
software that has several basic functionalities. Before the actual construction can take place,
the development process must follow several steps in order to satisfy the needs of the system
end user. These user requirements are used to drive all subsequent stages of systems
development. Poorly or incorrectly specifying the requirements normally produces the
systems that need major revisions or abandoned entirely (Pressman 1996).
In the effort to develop this mind mapping software, the requirements represent the
tasks that system must meet in order to be successful. Usually these requirements are
specified as a set of functions expressed at high level of abstraction and are later refined to
the detailed specifications (Edward R. Sim, 2000). In other words, the object oriented
requirement analysis presented in this paper is attempting to determine what the MAPPiXCS
system is supposed to do.
The objective of object oriented analysis is to produce a complete description of
problem domain and requirements of proposed system (Fichman and Kemerer, 1992). The
advantages of using object oriented approach in analysis are encouraging the reuse of
software, decreasing amount of new code that has to be written, reducing development time
and leading to a software internal structure that can be maintained in an easier way.
Consequently, they are expected to improve software quality by encouraging information
hiding, abstraction and proper modularization by leading to the systems that are more
understandable, more reliable and more modifiable (Moreira, Freitas and Guerreiro, 1989).
A methodology is a collection of methods for developing coordinated by some
general philosophy for developing a system (Peters and Tripp, 1977). For MAPPiCXS
software development, object oriented methodology is applied that is absolutely based on the
concepts of object. This set of steps or procedures need to be performed from the beginning
of software development process until the end to make sure the output produced is acceptable
and beneficial. Specifically, Unified Software Development Process (USDP) framework
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 293
model is applied to conduct object oriented analysis for the system. This model adopts an
interative approach within four main phases which are inception, elaboration, construction
and transition. It is claimed that the USDP embodies much of the currently accepted best
practice in information system development including requirements driven development
(Bennett, McRobb and Farmer, 2002).
This paper concentrates on the requirement analysis phase to describe the
functionalities of the proposed system. In section 2, this study adopts USDP model to conduct
problem domain analysis and then, the result is discusses in section 3. Finally, this paper
concludes the study in section 4.
2.0 Methodology
The USDP development process starts with requirements capture and modeling. Then, it
continues to requirement analysis, system and class design and consequently to the
construction and testing phases. However, this paper will cover up to requirement analysis
stage only.
To model the requirements, Unified Modeling Language (UML) is used as a tool for
analysis. It has a set of diagrams for sketching and documenting the design of software. If
offers use cases for capturing functional requirements and class diagram for visualizing the
structure of software code (Popandreeva, 2007). This section presents the requirement
capture and modeling activities where the problem is defined, domain analysis is conducted
and requirement list and use case model are generated. Meanwhile for requirement analysis
stage, the use case model is analyzed to produce initial system architecture represented by
class diagram.
2.1 Problem definition
The activities begin by defining problem stated in previous published study on MAPPiCXS.
According to Abdurrahman and Juzlinda (2009), the current mind mapping software
available in the market does not provide function to create matrix or table in order to organize
large volume of data in mind map diagram. Furthermore, there is no local version of mind
map software that exists to support Arabic and Jawi characters and to provide Islamic icons.
This paper focuses on including the matrix or tables for mind map diagram, in
addition to the basic functions. Since the local version aspect encompasses mainly on the
design stage, it is catered for later and excluded from this paper scope.
2.2 Domain analysis
In order to provide basic requirements for the proposed mind mapping software, the manual
process of mind mapping creation need to be understood. For that purpose, the entire
previous published document on MAPPiXCS has been scanned to find everything that
matters regarding mind mapping techniques and software. Based on the previous published
work by Abdurrahman and Juzlinda (2009):
The process of creating a mind map begins with a word or image, placed in the middle in the
page which symbolizes a topic to think about. The process continues with writing down the
subtopics or chapter headings on the thick branches derived from the main topic. As idea
emerges, the sub-subtopics are placed on the thinner lines radiating from each of the
subtopics or chapter headings. To support the memory of learner, it is recommended to use
symbols, images, keywords and colors to indicate emphasis and associations. For
MAPPiXCS software, there is a unique feature need to be inserted in the system which is to
add matrix or table into the mind map diagram. This feature includes the process of matrix
creation and editing.
Based on the previous statement and problem definition, a list of user requirements is
derived and displayed in the following table. The list describes the functions that need to be
embedded in MAPPiCXS software.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 294
Table 1: Requirement List
No. Requirement Use Case(s)
1. To create, print and save a mind map in a file Create mind map file
2. To open existing mind map file Open mind map file
3. To insert nodes that connected with each other through arcs or
lines.
Add a new node
4. To remove nodes from the mind map Remove node
5. To resize the selected nodes Resize node
6. To insert and edit matrix or table in mind map diagram Add a new table
7. To edit matrix or table in mind map diagram Edit table
8. To remove the selected table or matrix Remove table
9. To insert Roman, Arabic, Jawi text on a node Add a new text
10. To edit colors, styles and size of Roman, Arabic and Jawi text or
keywords in a node
Edit text
11. To remove Roman, Arabic and Jawi text from mind map Remove text
12. To insert image on a node in a mind map diagram Add a new image
13. To resize selected image on a node Resize image
14. To remove selected image from node Remove image
15. To insert Islamic icon on a node Add a new icon
16. To resize selected Islamic icon in node Resize icon
17. To remove selected Islamic icons in node Remove icon
18. To view a complete mind map diagram View mind map
19. To zoom in the mind map diagram in a view Zoom in
20. To zoom out the mind map diagram in a view Zoom out
2.3 Use case model
On the basis of the requirement list in the previous step, a use case diagram is formulated as
in the following figure to visually model the requirements:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 295
Figure 1: Use Case Diagram for MAPPiCXS.
After the formulation of use case model, nouns and verbs are identified to derive objects and
methods needed to support each of the use case.
2.4 Class diagram
Based on the objects and methods identified in the use case diagram, a conceptual class
diagram is developed to describe the initial system architecture. This initial architecture
shows all the classes those will be used to create objects and their relationships. The analysis
class diagram is as follows:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 296
Figure 2: Class Diagram
3.0 Discussion
This paper finally lays out initial system architecture of MAPPiCXS in the form of a class
diagram. The functional requirements have been modeled using a use case diagram that
shows the overall functionality of the system.
Based on the use case, the user can create a new file to draw a new mind map. To
draw a mind map, the user can add nodes, texts, tables, icons and images in the file. The
nodes are the container or places that hold the texts, icons and images. These nodes, icons
and images can be resized according to the user needs. Meanwhile, the table and text can be
edited to change the attributes of the font such as style, size and color. All these items can be
removed from the diagram if the user wishes to do so. After the drawing takes place, the user
needs to save the mind map by saving the file and optionally can print it. The user can view
the complete mind map and has the options to zoom in and zoom out. In addition, the user
also can open an existing mind map file to edit or print the mind map diagram.
From the use case, the potential objects and methods can be identified using key
concepts. These key concepts (when occurring as nouns) are good indicators for objects while
verbs can be used to indicate the associated methods. Objects that share the same
characteristics are grouped into class. To establish the relationship among different classes,
the class diagram is developed. The class diagram produced in this stage shows aggregation
or composition relationship. A file consists of a mind map object. This mind map object is
composed of several nodes, tables, texts, icons and images. It is the whole-part relationship
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 297
among those classes. Moreover, there are some basic methods are recognized for each class
in this initial analysis class diagram.
4.0 Conclusion and Future Works
This study is the first step towards developing MAPPiCXS using object oriented
methodology. This methodology promotes a smooth transition from problem definition all the
way to the analysis class diagram. Adopting this approach give a great advantage of
converting the user requirements into fundamental architecture of MAPPiCXS system.
Moreover, this approach is supported by UML diagram to visualize the requirement and class
models. However, the class model needs to be refined again and again until all the attributes
and methods necessary to support the solutions are defined. To achieve that in the future, this
research must apply object oriented design in order to define the implementation details for
producing the complete overall system architecture.
References
Abdurrahman Jalil and Juzlinda Mohd Ghazali (2009). MAPPiXCS: A Proposed Mind
Mapping Software. International World Conference on Muslim Education 2009.
Popandreeva, A. (2007). Object Oriented Analysis and Design Using UML of a Test
Rotation With Sample. International Conference on Computer Systems and
Technologies.
Bennett, S., McRobb S. and Farmer R. (2002). Object-Oriented System Analysis and Design
Using UML. 2
nd
Edition. United Kingdom, McGraw-Hill.
Pressman, R.S. (1996). Software Engineering: A Practitioners Approach. 3
rd
Edition. New
York, McGraw-Hill
Fichman, R. and C. Kemerer (1992). Object Oriented and Conventional Analysis and
Design Methodologies. Computer (Oct), 22-39.
Moreira, A., Frietas M. M. and Guerreiro P. (1989). Using Object Oriented Requirement
Analysis for a High Reliability Message Switching System. Portugal
Peters, L. and L. Tripp (1977). Comparing Software Design Methodologies. Datamation
(Nov), 89-93.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 298
A STUDY ON IMPLEMENTATION AND IMPACT OF GOOGLE HACKING TO
INTERNET SECURITY
Muharman Lubis
1
, Nurul Ibtisam binti Yaacob
2
, Hafizah binti Reh
1
, Montadzah
Ambag Abdulghani
1
1
Universiti Islam Antarabangsa Malaysia (UIAM)
2
Kolej Universiti Islam Antarabangsa Selangor (KUIS)
muharman.lubis@gmail.com, ibtisam_111@yahoo.com, fiza_hafiz85@yahoo.com,
mon_abdulgani@yahoo.com
Abstract
As the number of Web sites and amount of information have increased, modern life are
relying more on search engines to scoop up relevant piece of information out of Information
Sea. In response to rapidly growing amount of information on the Web space, major search
engine companies such as Google, Yahoo and MSN crawl Web servers and index crawled
information more frequently and thoroughly on the global level. Furthermore, to stay on top
of the competitive search engine market, they diligently improve search algorithm and
endeavor to provide internet users with easy-to-use search interface. Due to this diligent and
competing effort of search engine companies, Internet users can freely access billions of
pages of information regardless of time and space constraints with a simple typing and
clicking. Google Hacking uses the Google search engine to locate sensitive information or to
find vulnerabilities that may be exploited. This paper identifies and evaluates how much
effort it takes to get Google Hacking to work and how serious the threat of Google Hacking
is. The paper discusses the implementation and impact of Google Hacking to Internet security
and recommends couple of probable solutions on how to avoid or resolve it.
Keywords: Google Hacking, search engine, Internet security, hacker.
1. Introduction
Wikipedia has defined Google Hacking as the art of creating complex search engine queries
in order to filter through large amounts of search results for information related to computer
security. In its malicious format it can be used to detect websites that are vulnerable to
numerous exploits and vulnerabilities as well as locate private, sensitive information about
others, such as credit card numbers, social security numbers, and passwords. This filtering is
performed by using advanced Google operators. Attackers can use Google Hacking to
uncover sensitive information about a company or to uncover potential security
vulnerabilities. A security professional can use Google Hacking to determine if their websites
are disclosing sensitive information.
When a computer connects to a network and begins communicating with other
computers, it is essentially taking a risk. Wikipedia has defined Internet security as the
protection of a computer's Internet account and files from intrusion of an unknown user.
Basic security measures involve protection by well-selected passwords, change of file
permissions and back up of computer's data.
Internet security professionals should be fluent in the four major aspects, which are
penetration testing, intrusion detection, incidence response and legal/audit compliance. While
Google Hacking does not necessarily follow the standard definition of hacking, it can prove
only as fruitful. By using Google, we can gain access to information that may otherwise be
hidden. The information gathered using these hacks will allow us to gain access to systems or
devices. The hacks work because Google indiscriminately stores information when its Web
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 299
spiders crawl the Internet. By using the advanced operators, we can view this information.
Google makes it extremely easy to find this information. Those with more computer
knowledge will have a smaller learning curve, but it will not take that long for even a novice
Internet user to master these techniques.
Whatis has defined implementation as a carrying out, execution, or practice of a plan,
a method, or any design for doing something, while Wordnet defined impact as a forceful
consequence; a strong effect, which relates to the using of Google Hacking by certain people
or group into Internet Security. Security professionals can address the problem of Google
Hacking in a manner similar to addressing other security issues. They can use Google
Hacking to test their Web sites for sensitive information disclosure. They also can educate
employees concerning what information should not be put on the Internet and they can also
implement enforceable policies to ensure employee compliance.
2. Literature Review
2.1. Hacking
The idea of hacking might be conjured up stylized images of electronic vandalism, espionage,
dyed hair and body piercing but the essential none other than that. Most people associated
hacking with breaking the law, claimed all those who engage in hacking activities to be
criminals. Indeed, there are people out there who use hacking techniques to break the law but
hacking is not really about that [4]. The hacking is a way of understanding what is possible,
sensible and ethical in the twenty-first century by stressed this embedded towards our life
because the hack needs a social and cultural context [8]. In order to understand what hacking
is, we need to know the difference between hacking and cracking [9]. The definition of
hacking somehow change with cracking because the media role and thoughtless of some
people. All these hacking activities exist within a set of communal relations that each of them
expresses a different aspect of hacking.
Recently, hackers have been divided into three categories that are black hats, white
hats and grey hats, which have been referred as malicious hackers, ethical hackers and
ambiguous hackers correspondingly [22]. Black hat hackers are people who hack computing
systems for their own benefit or the one who breaks into systems illegally for personal gain,
notoriety or other less-than-legitimate purposes [16][20]. White hat hackers are the one who
wrote and tested open source software, worked for corporations or hired by companies to
help them beef up their security, worked for the government to help catch and prosecute
black hat hackers and otherwise use their hacking skills for noble and legal purposes. There
are also hackers who refer themselves as gray hat hackers that they are operating somewhere
between the two primary groups [16]. Gray hat hackers might break the law but they consider
themselves to have a noble purpose in doing so. For example, they might crack systems
without authorization and then notify the system owners of the systems fallibility as a public
service or find security holes in software and then publish them to force the software vendors
to create patches or fixes for the problem. There are several methods of performing hack and
one of the powerful and effective techniques of doing this activity in uncovering the sensitive
information is by using search engines.
2.2. Search Engine
Nowadays, it is really hard to search information as the number of resources available on the
internet is increasing at a rapid rate. Consequently, search engine that is also known as web
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 300
search engine or automated web search, which is one of the services provided by Internet has
been introduced [3]. It helps us in finding information stored on a computer system and
minimizes the time required to find information. It used a spider to gather information from
World Wide Web and other servers and in a crawler will generates indexes of information
they find that based on keywords entered by the users.
One of the most powerful, efficient and effective search engines is Google [22].
Organizations usually disclose too much information on their Web servers without ever
knowing. Search engines powerful features like Google is allowing users even to find some
sensitive information stored in the far corners of Web-connected servers and perform a
vulnerability-searching attack. Currently, Google search engine has up to 12 billion pages
[22] and whether believe it or not, it is actually the starting point of many hacking activities
and in fact, it is also one of the most interesting uses of Google! This kind of activity is
known as Google Hacking.
2.3. Google Hacking
Organizations usually disclose too much information on their Web servers without ever
knowing that the leak or weakness in there, somehow it is utilized by malicious hacker.
Further, search engines like Google has powerful features that allow users to find some
sensitive information stored in the far corners of Web-connected servers and even perform a
vulnerability-searching attack. In the past 2 years, Google Hacking is a term that has not only
become commonplace in the security community but in the mainstream media as well [13].
Apparently, Google hacking involves using the popular Google search engine to locate
sensitive or confidential online information that should be protected but they are not.
Google Hacking is actually the most popular technique in hacking activities that
publicly introduce by Johnny Long around 2004. Attackers can use Google Hacking to
uncover sensitive information about a company or to uncover potential security
vulnerabilities through Internet even some people could use Google Hacking to determine if
their websites are disclosing sensitive information which known as penetration testing or
vulnerability assessment.
Using search engines to uncover sensitive information is not a new concept.
Nonetheless, with the numerous advanced search operators that Google makes available on
its enormous database, carefully crafted query strings can reveal jaw-dropping results [10].
Usually, the filtering methods are performed through using advanced Google operators while
attackers can use Google Hacking to uncover sensitive information about a company or to
uncover potential security vulnerabilities. A security professional can use Google Hacking to
determine if their websites are disclosing sensitive information. Google Hacking turned out to
be a very powerful and flexible hacking approach, it also found was very helpful to use
Google cached pages while performing Google Hacking [2]. Google crawls web pages and
stores a copy of them on its local servers. They have tried to use Google cached pages to
anonymously browse a target site without sending a single packet to its server. Google grabs
most of the pages through crawls but omits images with some other space consuming media.
When viewed Google cached pages by simply clicking on the cached link on the results page,
the hackers will end up connecting to the target's server to get the rest of the page content.
When a user enters a keyword in a search text, the spider will start exploring the
Webs. Then the Google later on will return a results page that consists of a name list of the
site, a summary or snippet of the site, the URL of the actual page, a cached link that shows
the page as it looked when the spider last visited the page and a link to pages that have
similar content [10]. Googles search results are dynamic. When a query is submitted through
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 301
Googles web interface, Google takes user to a created results page that can be represented by
a single URL that will appear in user browsers address bar. For instance like the following
URL:
http://www.google.com/search?hl=en&q=%22peanut+butter+and%22+jelly&btnG=Search
The question mark (?) denotes the end of the URL and the start of arguments, the
ampersand (&) separates arguments, (h1) represents the language in which the results page
will be printed, (q) represents the start of the query string, (%22) represents the hexadecimal
value of the double quotes character, the plus sign (+) represents a space and (btnG=Search)
denotes that the Search button was pressed on Googles web interface [13]. Knowledgeable
Google users can edit the URL directly inside their browsers address bar and hit enter to get
the new search results in a very quick way. As a security professional, it is critical to
understand these URLs, so that no one can perform a Google hacking vulnerability
assessment.
The Google Hacking Database (GHDB) is a database of queries used by contributed
hackers to identify sensitive data on your website such as error messages, files containing
passwords, files containing usernames (no passwords), files containing juicy info (no
usernames or passwords, but interesting stuff none the less), pages containing logon portals,
pages containing network or vulnerability data such as firewall logs, sensitive online
shopping information, various online devices and vulnerable servers [5][22].
3. Implementation
Beside basic search technique and function search technique, Google also provided advanced
search technique. Advanced search technique uses advanced operators to help refine
searches. Table 1 shows list of the advanced operators.
Table 1: List of Advanced Search Operators
Search Service Advanced Search Operators
Web Search allinanchor:, allintext:, allintitle:, allinurl:, cache:, define:, filetype:, id:,
inanchor:, info:, intext:, intitle:, inurl:, phonebook:, related:, site:
Image Search allintitle:, allinurl:, filetype:, inurl:, intitle:, site:
Groups allintext:, allintitle:, author:, group:, insubject:, intext:, intitle:
Directory allintext:, allintitle:, allinurl:, ext:, filetype:, intext:, intitle:, inurl:
News allintext:, allintitle:, allinurl:, intext:, intitle:, inurl:, location:, source:
Product Search allintext:, allintitle:
By using the basic search techniques combined with Google's advanced operators,
anyone can perform information gathering and vulnerability searching using Google. This
technique is commonly referred to as Google hacking. Search Engine in the specific approach
has to collect all the pages in the cyber world by using the system which was robot,
nonetheless, its not like what robot we are thinking or guessing, it was the robot search
engine, well known with Bot, Crawler or Spider. It was the special software that has
functioned to crawl all pages in the world, collect them and store them in the Google
database. Every collection will be indexed by Google to make easiest for every person search
what they want and these were the reason why we enjoy use Google as our search engine.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 302
This Googlebot also the main power of Google search engine to be the famous search
engine in the world, as well as the hacker who use to foot printing or something illegally.
Johny Long first introduce this technique by simplifying and combination the Google
operator, we could find the valuable information around the world massively.
Google Hacking already became popular not only in the hacker communities, but it
also in common people who do not really understand the hacking procedure. The method and
design in using Google search engine for hacking activities involves the combination between
basic and advance operator in Google to maximize the specific searching and finding. It
could be divided as formal design that refer to Googledork and Googleturds which have been
introduced by Johnny Long and recognized by academic and media level, Google automated
scanner that refers to specific software be built by communities or person to facilitate Google
hacking, manual exploration that refer to single attempt by certain malicious hacker in
enhancing Google hacking knowledge and lastly, the integrated hacking which put Google
hacking as the beginning process before do other method of hacking.
The one of well-known implementation to utilize the Google Search engine is
Googledork. It is the attempt to standardize function of Google Hacking by the first
introducer, Johnny Long in his website as sharing knowledge. The term Googledork that was
coined by the author has originally meant as an inept or foolish person as revealed by Google
[5] but after a great deal of media attention, the term came to describe those who troll the
Internet for confidential goods. Either description is really fine but what matters are that the
term Googledork conveys the concept that sensitive stuff is on the web and Google can help
you find it. The official Googledorks page lists many different examples of unbelievable
things that have been dug up through Google by the maintainer of the page, Johnny Long,
that are around 14 categories of them referring to GHDB [5][22]. Each list shows the Google
search required to find the information, along with a description of why the data found on
each page is extremely interesting.
On the other hand, syntax and operator function in Google search engine does not
miss the error or the weakness either, these one recognized as Googleturds that defines as the
little dirty pieces of Google waste [11]. These search results seem to have stemmed from
typos Google found while crawling a web page. Google also can reveal many personal data
when its advanced search parameters are used. The implementation of Googleturds along
before is quite amazing with the revealing of credit card, web directories, password and many
more. Google concerns more to correct the error in their operator and patterns because the
high pressures from certain organization and companies towards the huge impact of the uses
these errors.
Google hacking involves the use of certain types of search queries to look for Web
site vulnerabilities. More than approximately 1,500 such queries, mostly stored in the GHDB
website by Johny Long, some of just spread to the other discussion website or blog. This
Google Hacking trend slowly but surely brings more people to develop the easiest tools or
software to search effectively and efficiently that combine certain methods of the
Googledorks inside it. Unfortunately, sometimes organizations set up their systems in a way
that allows Google to index and save a lot more information than they intended [15].
Another implementation is Google automated scanner, one of the famous one is
Goolag Scanner, a Windows-based auditing tool that was built around the concept of Google
Hacking. The Cult of the Dead Cow hacker group released an open-source tool designed to
enable IT workers to quickly scan their Web sites for security vulnerabilities and at-risk
sensitive data, using a collection of specially crafted Google search terms to provide a very
easy and legitimate tool for security professionals to test their own Web sites for
vulnerabilities, and to raise awareness about Web security in and of itself [17].
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 303
Actually, many attempts have done in implementing Google hacking process
automatically using the software even the newbie could use it at all. Goolag Scanner,
Gooscan, Google Hacks, subdomain Lookup and many more are the examples of software to
facilitate these activities, perhaps time by time will increased more along with the popularity
of Google which become great. Interestingly, the approach will bring many people try more
to use Google operator in searching private data thorough the Internet intentionally that force
organization or company put their best effort to prevent them.
On the contrary, the malicious expert hacker could utilize this kind of technique
whereby massive newbie try to use Google hacking. Once they know the pattern, the in-depth
searching of implementation through manual exploration could be done effectively and
efficiently. The ease of use Google Hacking somehow really incredible, every time and
everywhere we could use Google search engine to find out private data in various purposes.
The private data searches grouped into four different sections according to the privacy level.
These are identification data, sensitive data, confidential data and secret data searches [17].
Identification data relates to personal identity of user, it could be found out by
keywords like name, address, phone, email, curriculum vitae, username, etc., optionally for a
certain person or within certain document types like following query which find out many list
of identity:
allintext:name email phone address ext:pdf
Meanwhile, sensitive data relates to data public but contain private data whose reveal
might be anger the owner, like emails, forum postings, sensitive directories and Web2.0
based applications like following query which find out sensitive directories:
intitle:"index of" inurl:/backup
Whereas the confidential data relates to private data that could be accessed by certain
group or person only like passwords, chat logs, confidential file, online webcams, etc but
Google still could reveal this kind of data like following query which find out address of
online webcam:
inurl:viewerframe?mode=motion
Lastly, secret data that relates to private data accessible only to the owners like
encryption messages, private keys, secret keys, etc. Finding encrypted message could be
found by following query like:
-intext:"and" ext:enc
All kind of manual search explorations only need the in-depth knowledge in format,
patterns, operator, perimeter and practice. Certain person could be independence or
autodidact to be expert in Google hacking. However, the worst case in implementing Google
search engine is by combining it with other hacking methods so it only the beginning process
like footprinting, port scanning, information gathering and so on to further hacking process
which known as integrated hacking. The prediction to utilize Google search engines as only
the first step to gain current weakness or vulnerability in certain method became the hot topic
relates to the process to prevent and recognizes it. Nowadays, any hacking incident most
likely begins with Google [11] so utilization of Google Hacking is only the beginning but the
impact resides in there hazardously. The organization, corporation or even the single
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 304
individual which store their data in the website should develop their own strategy, policy and
procedure to keep secure and safety their own data from being revealed by somebody.
4. Impact
The search engines especially Google itself already became the important tool in our daily
activity by using Internet so it will difficult to differentiate in the beginning which user or
group has intentionally to do Google hacking. Consequently, there is no certain method to
identify them but only the protection and response from both Google Corporation and the
website system administrator can be measured at this moment. The massive attack of Google
hacking have given the direct and indirect impact to Internet security, in this study we
classified the directly impact into low impact which associated mostly in exploration,
moderate impact which associated mostly in exposure and high impact which associated
mostly in exploitation, with both positive and negative impact, somehow trend and
standardization; awareness on Internet security; strategy, policy and procedure become the
indirectly impact. Table 2 shows the list of current impact that usually Google hacking
caused.
Table 2: Impact of Google Hacking
Negative Impact Positive Impact
Low Impact
Free access online newspaper Finding information regarding certain
people
Mass quantity Google hacking user Google block the Googleturds
Find Sub domain lookup Google hacking as Artificial Intelligence
Google Proxy Server hacking Awareness on Internet security
Moderate Impact
Find out vulnerabilities in server, files, web
files, web application, unauthenticated
program, various online devices, etc
Google Analytics Implementation
Checklist
Application Fraud Enhance Tools to Protect the Privacy
Google Hacking Exposed VoIP Penetration Testing
Footprinting Standardization Hacking Process Analysis
Social Engineering Certification Ethical Hacker
Google Hacking as Malicious Code Honeypot Project Google hacking trap
High Impact
Oracle Database Exploitation Fraud Prevention Telecommunication
Indexes & Reveal Sensitive/Confidential
Data
Safeguarding privacy against misuse and
exploits
SAP Enterprise Portal Security Exposure Enhance Defense Security Strategy
Identity Theft Fraud Management Industry
Advanced MySQL Exploitation Internet security management Development
(Prevention, Protection, Response and
Recovery)
Apache Database Exploitation Internet safety, security and privacy
manuals
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 305
The last several years, identity theft has been one of the fastest growing crimes.
Unfortunately, the Internet has been facilitating this phenomenon since it represents a
tremendous open repository for sensitive identity information available for those who know
how to find them, including fraudsters [1]. The exploitation of benefits from one identity is
really worst case let alone the many identity being used by certain user, it will give huge
damage to certain company, the system and the related users themselves.
Google Hacking somehow became the trend in information communication and
technology community even they made the standardization as the process of developing and
agreeing upon technical standards among them. Both trend and standardization also become
the hot discussion influence by the massively use of Google Hacking.
Today, information, systems and networks are pervasive and ubiquitous, all of them
provided throughout the Internet. Internet vast resources are an excellent means for everyone
to explore, research, and enjoy new information and interests. The Internet is a public place,
however, so it became important to teach the Internet user how to be safe throughout the
Internet because it also lies the dangerous in there.
Recently, we need to learn about Google Hacking to provide a good level of
protection for our sites and to check for sensitive information disclosure as strategy and
policy in anticipating Google hacking. As we become more familiar with manual hacks, we
can start using some of the automated Google Hacking tools. It will automate the hacks but it
is ensuring that every single page within our site is protected. Automated tools allow for
periodic security checks with frequency that is simply impossible to achieve with manual
hacks. Here the common activities based on the strategy, policy and procedure in assuring
Internet security that usually organizations proceed [14]:
1. Ensure host and network security basics are in place.
2. Build/publish security features (authentication, role management, key management,
audit/log, crypto and protocols.
3. Use external penetration testers to find problems.
4. Create share standard policy.
5. Identify gate locations and gather necessary artifacts.
6. Know all regulatory pressures and unify approach.
7. Identify personally identifiable information (PII) obligations.
8. Provide awareness training.
9. Create security standards.
10. Perform security feature review.
11. Identify software defects found in operations monitoring and feed them back to
development.
12. Ensure QA supports edge/boundary value condition testing.
13. Create or interface with incident response.
14. Create data classification scheme and inventory.
15. Use automated tools along with manual review.
The sharing knowledge on the strategies, policies and procedures is the advantages
own by every companies or organization to fight back the Google Hacking threat, even
though the full security itself never exist, somehow it really prevent the confidential or
sensitive data towards the kiddy or newbie of Google Hacking that usually increase day after
day as mountain as the impact of the openness of knowledge in the Internet. The discussion
and improvement should be done frequently, just in case to expertise the strength of the
strategy, policy and procedures while the process of assuring and monitoring also should be
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 306
done effectively. The maintenance of these three approaches is really difficult like other
process of maintenance. Apparently, we could not deny it because the management risk is the
attempt to prevent such disaster occurs towards security of the company. It is better to
prevent rather than a cure, in this case a security measurement rather than a disaster recovery.
Google Hacking could become serious and great threats to an organization or
company. If a hacker spent enough time analyzing the target and understanding how the
queries found information, they will be able to find the information that they want even if the
information are confidential or sensitive. Moreover, the well-known implementation to
utilize the Google Search engine, Googledork and the Google automated scanners will help
hacker to easily find sensitive data using Google. It shows that almost effortless for today
hacker to do Google Hacking.
5. Recommendation and Conclusion
To be publicly accessible is the nature of web sites and applications. Combined with search
engine functionality, it makes it effortless for attackers to access an organization site or find
out information about the organization. Some organization did not realize that even directory
listings, error pages and hidden login pages can be indexed and when a search engine indexes
a site, it inadvertently providing loads of information for potential attackers. This is what
Google hacking all about. However, there are some probable solution and prevention to these
problems. The best way to face the Google hacking by doing the basic risks management and
those are prevention, protection and response.
Prevention from Google Hacking relates to anticipation of needs, management
wishes, hazards and risks [7]. One of the strategies in approaching the Google Hacking
prevention are by reducing risk in the existing website so that the disaster has the lower
probability of occurrence. However, those methods can be implemented if the services are
provided only in the low scale without the need of mobility and intense of sharing data such
as keep sensitive data off, consider removing site from Google's index [21], automatic
scanner, mitigation data, run regularly schedule assessment and so on.
Protection from Google Hacking relates to the process of keeping something such as
confidential information or sensitive data safe from being hacked. For instance, a security
token associated with a resource such as a file. Usually, the approach an organization could
take for protection is by balancing their availability, integrity, confidentiality and
performance such as installing firewall, Robot.txt [18], Google Hack Honeypot [6] and so on.
Response from a company that has been hacked by Google hacker is very important
in order to avoid the occurrence of the same kind of incident. If the company did not respond
to this incident, there might be another sensitive or confidential data stolen by the hacker.
Furthermore, since the replacement cost let say, for stolen research data is high, of course, a
company do not want to cover the cost again after one incident such as report the incident,
educate the employee, incident Response Policy and so on.
Thus, we as a user should aware on the situation that even hidden login pages can be
indexed and when a search engine indexes a site, it unconsciously providing treasure troves
of information for potential attackers. We should improve our information security in order to
avoid our confidential or sensitive data from being hacked and finally, we should also prepare
ourselves with the best methods of protection and prevention from Google Hacking.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 307
References
[1] Abdelhalim, A. and Issa, T. (2007). The Impact of Google Hacking on Identity and
Application Fraud. Proceedings of PACRIM07, p. 240-244.
[2] Billig, J., Danilchenko, Y. & Frank, C.E. (2008). Evaluation of Google Hacking.
Proceedings of InfoSecCD Conference08, p. 27-32, September 26-27, 2008,
Kennesaw, GA, USA.
[3] Comer, D. (2007), The Internet Book: Everything You Need to Know about Computer
Networking and How the Internet Works. 4
th
Ed. Prentice Hall.
[4] Erickson, J. (2003), Hacking: The Art of Exploitation. No Starch Press.
[5] Google Hacking Database. (2010). Retrieved January 20, 2010, from Hackers for
Charity.Org website: http://www.hackersforcharity.org/ghdb/
[6] Google Hack Honeypot Team. (2005). Google Hack Honeypot Manual. Retrieved
January 20, 2010, from ghh: The Google Hack Honeypot website:
http://ghh.sourceforge.net/GHH_User_Manual.pdf
[7] Hewlett Packard. (2007). Preventing Google Hacking: Steps to Protect your Web
Application. Retrieved February 1, 2010, from docstoc website:
http://www.docstoc.com/docs/3292692/4aa1-5395enw-preventing-google-hacking
[8] Jordan, T. (2008), Hacking: Digital Media and Technological Determinism. Polity.
[9] Knittel, J. & Soto, M. (2003), Everything you Need to Know about the Dangers of
Computer Hacking. The Rosen Publishing Group.
[10] Lancor, L. & Workman, R. (2007). Using Google Hacking to Enhance Defence
Strategies. Proceedings of SIGCSE 07, p. 491-495.
[11] Long, J. (2004), Google Hacking Mini-Guide. Retrieved on February 1, 2010, from
http://www.informit.com/articles/article.aspx?p=170880&seqNum=4
[12] Long, J. (2007). The Google Hackers Guide: Understanding and Defending against
the Google Hacker. Retrieved January 20, 2010, from encription website:
http://www.encription.co.uk/downloads/The_Google_Hackers_Guide_v1.0.pdf
[13] Long, J. & Skoudis, E. (2005), Google Hacking for Penetration Testers. Syngress.
[14] McGraw, G., Chess, B. & Migues, S. (2010). Software [In]security: What Works in
Software Security. Retrieved January 20, 2010, from informIT website:
http://www.informit.com/articles/article.aspx?p=1569495
[15] Scalet, S. D. (2006). 5 Ways Google is Shaking the Security World. Retrieved February
24, 2010, from
http://www.csoonline.com/article/221515/5_Ways_Google_Is_Shaking_the_Security_W
orld?page=1
[16] Shinder, D. L. & Cross, M. (2008), Scene of the Cybercrime. 2
nd
Ed. Syngress.
[17] Tatli, E. I. (2006). Google Hacking Against Privacy. Retrieved January 20, 2010, from
http://th.informatik.uni-mannheim.de/people/tatli/pub/ghack_privacy.pdf
[18] The Web Robots Pages. Retrieved on February 1, 2010, from http://www.robotstxt.org
[19] Vijayan, J. (2008). Hacker group releases automated Google hacking tool: Cult of the
Dead Cow says scanning software can find Web site holes via Google searches.
Retrieved January 20, 2010, from Computerworld website:
http://www.computerworld.com/s/article/9064238/Hacker_group_releases_automated_
Google_hacking_tool
[20] Wang, J. (2009), Computer Network Security. Springer.
[21] Webmaster Tools. Removing my own content from Google. Retrieved February 1, 2010,
from http://www.google.com/remove.html
[22] Yerrapragada, K. P. (2007). Google Hacking!!! Retrieved January 20, 2010, from
College of Engineering, San Jose State University website:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 308
http://www.engr.sjsu.edu/meirinaki/courses/cmpe237/studentpresentations/Krishna_GO
OGLE%20HACKING.pdf
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 309
KNOWLEDGE MANAGEMENT: USING MICROSOFT OFFICE SHAREPOINT
SERVER TO DEVELOP VIRTUAL KNOWLEDGE PLATFORM
Mohd Misron Omar, Romiza Md Akhir, Azlina Shaikh Awadz,
Noor Raihan Abdul Hamid
Graduate School of Business,
Universiti Tun Abdul Razak (UNIRAZAK),
47301Petaling Jaya, Selangor, MALAYSIA
misronomar@gmail.com
Faculty of Business Administration,
Universiti Tun Abdul Razak (UNIRAZAK),
47301Petaling Jaya, Selangor, MALAYSIA
romiza@pintar.unirazak.edu.my, azlinash@pintar.unirazak.edu.my,
raihan@pintar.unirazak.edu.my
Abstract
The practice of knowledge management in the organisation involves people, process and
technology. Organisation must be able to enhance people-to-people networking and also to
connect people with more corporate information. Hence, employees would be able to share
tacit knowledge and acquire explicit knowledge on knowledge platform effectively. The
Japanese recognizes knowledge platform as Ba. Ba is a physical space such as meeting
rooms, cyberspace or mental space. In this paper, we discuss the development of virtual
knowledge platform using Microsoft Office SharePoint Server (MOSS). As a powerful
enterprise integrated suite of server capabilities, MOSS would simplify the development
process and provide organisation with comprehensive content management, enterprise search,
accelerating shared business process, and facilitating information sharing. This technology
enabler also supports several knowledge management models such as Nonaka SECI model
and JT Frank POKM model.
Keywords: Knowledge management, Knowledge management system (KMS), Microsoft
Office SharePoint Server (MOSS)
1. Introduction
Knowledge Management (KM) is not about having a powerful tools or keeping everything in
the storage or retrieval databases. KM is about people, process and technology. In other
words, people are the most significance contributors and it involves the processes that relate
to their activities. Through Information Communication Technology (ICT), knowledge can
be captured and disseminated across the globe. The Japanese recognizes knowledge platform
as Ba. It is a physical space such as meeting rooms, cyberspace or mental space. In this
paper, we discuss how to leverage Microsoft Office SharePoint Server (MOSS) in developing
the virtual knowledge platform according to Nonaka SECI model or JT Frank POKM model.
Using MOSS.
2. Defining Knowledge Management
In a turbulent and increasingly changing environment, most organization faces challenges of
how best to manipulate its knowledge assets to generate value for the marketplace and obtain
competitive advantage (Lubit, 2001 and Smith, 2001). Organizations are beginning to realize
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 310
that there is a vast and largely under utilized assets scattered around the organization that is
knowledge (Gupta, Iyer & Aronson, 2000).
Knowledge management focuses on identifying and mapping intellectual assets
within the organization contribute to new knowledge as a competitive advantage and provide
corporate information accessible (Juhana et al, 2006). From the Japanese perspective, Nonaka
(1991) suggested that knowledge management should comprise a range of practices to
identify, create, represent, distribute and enable adoption of insights and experiences. Many
organizations foresee that they need an advanced approach to manage corporate knowledge to
succeed not only today but for tomorrows economies (Davenport & Prusak, 2000;
Davenport et al., 1998). Tiwana (2002) stressed on the ability of the organization to identify
the best practices and dispersed through corporate network of operations or locations as a key
driver of added value. Equally important, Jamaliah (2003) pointed out that organization that
has knowledge management system would spell profit and growth for the company. From
these discussions, it proves that knowledge management is very important to the survival of
the organization in the new economy.
Human capital is a vital asset of all organizations, whose knowledge need to be
preserved from an individual to the organization and at the same time allowing continual
learning and improvement. According to Schlie (1999) and Mullin (2001), knowledge
management is something about a knowledge flow process that reaches well beyond having
excellent data or information, communication, technology storage and retrieval to embrace
retrieval, creation, capture, use and reuse of knowledge and information for innovation. The
existence of the right technology should support the entire knowledge flow in an
organization.
Loshin (2001) shared his view, stating that knowledge management is the art or
science of collecting organizational data and by recognizing and understanding relationship
patterns, turning it into usable, accessible information and valuable knowledge. Knowledge
could be disseminated through various channels such as training programs, automatic
knowledge distribution systems or knowledge-based expert systems. Having the knowledge
based system available in the organization will allow the users to acquire the right knowledge
and to deliver the right knowledge at the right time. These will help in achieving the basic
goal of knowledge distribution and sharing. Knowledge sharing may be face-to-face, across
distance with electronic technology or across time with access to information archived by
others. Thus, promoting the flow of knowledge will stimulate knowledge creation process.
3. Technology as an Enabler
Technology is just an enabler for KM initiatives. It would only beneficial if the technology
could fit in the organizations people and processes.
MOSS is a powerful enterprise integrated suite of server capabilities. Thus, it would
simplify the development process and provide organization with comprehensive content
management, enterprise search, accelerating shared business process, and facilitating
information sharing. Those elements are essential for KM initiates to take place virtually.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 311
Figure 1: MOSS Framework
(source Microsoft)
From the above framework, it shows that MOSS would provide facilities for the
organization such as portal, collaboration, enterprise content management, enterprise search,
business intelligence and business processes.
4. Developing virtual knowledge platform
4.1 SECI Model
According to Nonaka and Toyama (2004), management can build ba by providing physical
space such as meeting rooms, cyberspace or mental space. The ba could be created across
organisation to encourage participation from all levels. What MOSS could provide are virtual
meeting for staff across the organisation.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 312
Figure 2: SECI Model (source Nonaka)
Adapting the SECI model would link socialization, externalization combination and
internalization with MOSS application services. Every staff could have their own
personalized site where they could share their working knowledge across the organization.
For example, they could share their tacit knowledge in the shared folder. The tacit to explicit
process occurs. When new staff joins the organization, they need to search more working
knowledge from the corporate network. These new staff would benefit from other colleagues
that had previously shared working knowledge. This time, explicit to explicit process occurs.
To deliver new task, these new staff would have to internalize from the explicit knowledge.
MOSS would definitely round up the SECI process in the practice of knowledge
management.
Figure 3: Personalized site (source Microsoft)
4.2 JT Frank POKM Model
The JT Frank POKM model introduces 8 mindsets such as K-identification, K-acquisition, K-
application, K-sharing, K-development, K-creation, K-preservation and K-measurement. It is
supported by 6 enablers namely physical architecture, structural design, policy, culture driven
k-tools, innovative knowledge professionals and technology.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 313
Figure 4 : JT Frank POKM Model (source http://www.jtfrank.com/)
Dashboard and KPIs in the MOSS application services would tackle the k-
identification functionality. It would link to competency database and also to all staff
personal details. The mapping shall provide the so called knowledge gap where staff could
determine their own required knowledge and competency against existing knowledge and
competency.
The function of K-tools is to disseminate lessons with the objective to ensure smart
decisions are repeated and mistakes are avoided. It could be in the form of narration of
critical corporate episodes, capturing institutional experiences, generating corporate lessons
learned and consistently learning from enterprise histories to move forward. The workflow
works as a standard operation procedural. This function could capture the identified process
so that it could be used for later references.
The learning history could be captured of the previous cost cutting exercise that may
include the retrenchment effect, downsizing model or loss of key persons of each department.
K-creation board is meant for k-creation and k-development where a member can throw any
business challenge, and being responded by knowledge generation, creation and k-driven
action. Both MOSS application services and core services provides identical functionality
that suits the organizations usages.
Again, MOSS would simplify the development process and provide organization with
KM model approach based on enterprise preferences. In addition, MOSS would also support
open source programming and scripting for advanced development. The MOSS web parts are
collections of customized solutions that are ready to be park immediately without having to
write any single programming languages. With minor modification, web part also could
flexibly link to other enterprise system such as SAP.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 314
Figure 5: Intranet
Organization that is concern with the login authentication would not worry since MOSS is
linked to the active directory and allows the single sign on. This facility is most enjoyable by
enterprise that needs to connect people to people across the boundaries.
5. Conclusion
Developing KMS that would beneficial and highly accepted by the people within the
organization is critical. It is not just for storage and retrieval but to make sure that MOSS
supports the KM initiatives. Investments on the hardware and software parts are other issues
when the cost is more than developing using the open source software. The theory of
knowledge creation such as SECI model has been shown that it is workable by leveraging on
MOSS. Applying JT Frank model approach would benefit and utilize the application services
and core services. Virtual knowledge platform could easily be developed on MOSS by
utilizing most of the MOSS framework. The lessons learned are significance example where
organization could capture and disseminate across the entire network. This paper discusses
and compares only 2 KM models where other KM models could be leveraged through
MOSS. Future study would use some comparison between developing KM knowledge
platform through other open source packages.
References
Davenport, T.H. & Prusak, L. (1998,2000). Working Knowledge. Harvard Business School
Press, Boston MA.
Gupta, B., Iyer, L. S. & Aronson, J. E. (2000). Knowledge management: practice and
challenges. Industrial Management and Data Systems, 100(1), 17-21.
Jamaliah, A.H. (2003). Understanding Knowledge Management. Universiti Putra Malaysia
Press, Serdang.
Juhana, S., Takeuchi, H., Nonaka, I., Toyama, R. & Mohd, S.O. (2006). Integrating Japanese
Knowledge Management Creation Theory into Knowledge Management Initiatives.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 315
Proceedings of the Knowledge Management Conference & Exhibition KMICE2006,
241-247. Universiti Utara Malaysia.
JT Frank. (2007). JT Frank POKM Model. Retrieved January, 2010 from
http://www.jtfrank.com/about2.html
Loshin, P. (2001). Knowledge Management, Computerworld, 35(43), 56-58.
Lubit, L. (2001). Tacit Knowledge and Knowledge Management: The Key to Sustainable
Competitive Advantage, Organizational Dynamics, 29(4), 164-178.
Microsoft. (2010). Share Point Server Homepage. Retrieved April, 2010 from
http://office.microsoft.com/en-us/sharepointserver/default.aspx
Mullin, R. (2001). Knowledge Management, Chemical Week, 163(39), 20-22.
Nonaka, I. (1991). The Knowledge Creating Company. Harvard Business Review, Boston
MA.
Schlie, T. W. (1999). Knowledge Management and the R&D Function: A Research Agenda.
Paper presented at the 1999 Annual Meeting of American Association for the
Advancement of Science, January, 21-26.
Smith, J. (2000). From R&D to Strategic Knowledge Management: Transitions and
Challenges for National Laboratories. R&D Management, 30(4), 305-311.
Tiwana, A. (2002). The Knowledge Management Toolkit. Prentice Hall, Upper Saddle River
NJ
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 316
VIRTUAL ENVIRONMENT AS AIDS IN PERSUADING
USERS IN LEARNING PROCESS
Mohd Fitri Yusoff, Abdul Nasir Zulkifli and Nur Fadziana Faisal Mohamed
College of Arts and Sciences,Universiti Utara Malaysia, 06010 UUM Sintok, Kedah,
Malaysia.
ym_fitri83@yahoo.com, nasirzul@uum.edu.my, fadziana@uum.edu.my
Abstract
With the advent of computing technologies, a plethora of computer applications were
developed to solve simple to complex human and organization problems. Computer
applications cover variety of fields and have been known to be powerful tools in changing
persons attitudes, behaviours, feelings and actions. This paper investigates the use of virtual
environment technology as aids in persuading users in learning process. It explains the
concept of persuasive and virtual environment technologies and the integration of both
technologies in persuading learners to learn. It elaborates on the design of persuasion and
explains the benefits of integrating persuasive and virtual environment technologies in the
learning process. Finally, it gives an overview of a proposed approach in utilizing virtual
environment as aids in persuasive design for learning.
Keywords: Virtual environments, Persuasive technology, Learning process
1. Introduction
Computer technology has a significant influence on the future of learning. The potential use
of this technology in learning include solving skills, scientific inquiry, understanding of
abstract mathematical concepts, communication skills, and workplace competencies (Ying-
Chen, 2000). Computer based learning (CBL) is a learning concepts that will help us to make
the present teaching learning process joyful, interesting and easy to understand through
multimedia elements aids. In CBL, various media such as text, images, animation, audio,
video, simulations, artificial intelligence and virtual environments are combined accordingly
into various forms or packages to serve various training requirements. Currently, most of the
available CBL are a combination of text, static graphics, audio, 2D animation and video.
Furthermore, the use of computer assisted learning as a tool in learning method simplifies the
learners in learning without immediate or direct supervision
from the tutor.
Various studies have shown that many learning process are based on the passive
concepts (Neo et al., 2007). Even though there are many forms of supplementary learning
materials available in the market, none of them promotes active learning for their users.
Furthermore, the current supplementary courses lack portable learning media that can be
accessed anytime and anywhere. Moreover, the combination of virtual environment in the
learning process can attract and also persuade learners and provide more understanding about
the discussed topic.
Although virtual environments have been recognized as an impressive learning tool, the
need for expensive head-mounted displays, gloves, and high-end computer systems have
somehow restricted its uses. However, today virtual environments systems can run by
affordable personal computers. Human interaction with the generated virtual worlds can be
performed using conventional input devices, such as the mouse and keyboard without
introducing any additional peripherals.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 317
2. Virtual Environments
Virtual environments (VEs) or also known as Virtual Reality (VR) are a relatively new type
of humancomputer interface in which users perceive and act in a three-dimensional world.
Laws (1996) defined VE as any real time interactive three dimensional systems, a virtual
space which can be visited but not necessarily resembling the real world. Meanwhile
Gasparyan (2007) described VR as a technology that allows computer-simulated interaction
between users and computer. There are many definitions of VE which broaden over the time.
However, the point is VE gives illusion of reality environment created by a computer system
to the users.
VE can be classified into three distinct groups: Non-Immersive, Semi-Immersive and
Fully-Immersive VEs (Kalawsky, 1993).
- Fully-immersive, is mainly based on the immersive VE technology, providing a
feeling of presence in the virtual world.
- Semi-immersive, is one in which the user is partially immersed in a VE.
- Non-immersive, is an environment that presents images on a normal monitor and
allows the user to interact with the computer generated images.
2.1 Virtual Environment as a Learning Environment
VE is the interactive three-dimensional computer generated environment. VE offers unique
capabilities that are able to provide significant and positive support for learning (Roussos et
al., (1999); Whitelock et al., (1996); Winn (1993)). Furthermore Stone (2001) stated that VE
is not a passive medium, as one might find with conventional learning and presentational
media; "chalk-and-talk", slides, overheads, videos and the like. The user is, within certain
geometric boundary or scripted constraints, free to explore wherever he or she wishes and
interact with objects in the world. This freedom, coupled with the "high-tech" nature of
Virtual Reality technologies is believed by many to help enhance trainees' intrinsic
motivation, thereby improving their learning (retention) and their subsequent performance
when transferring from the virtual world to the real world.
The main characteristics of a Virtual Learning environment are as follow (Dalgarno, 2002):
- The environment is modeled using 3D vector geometry, meaning that objects are
represented using X, Y and Z coordinates describing their shape and position in 3D
space.
- The users view of the environment is rendered dynamically according to their current
position in 3D space, that is, the user has the ability to move freely through the
environment and their view is updated as they move.
- At least some of the objects within the environment respond to user action for
example, doors might open when approached and information may be displayed when
an object is selected with a mouse.
- Some environments include 3D audio, that is, audio that appears to be emitted from a
source at a particular location within the environment. The volume of sound played
from each speaker depends on the position and orientation of the user within the
environment.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 318
Table 1: VE potentials in learning environment.
Potentials of VE Descriptions
VE is a experiential With sense of immerse and presence, users can feel that
the learning is the developments of experience.
VE allows natural interaction with
information.
Designing to fit with the human architecture in
interacting with the given information. Through the
human nature responses.
VE is a shared experience. VE provides more experience in learning especially for
active learning. Example: presence
VE allows unique capabilities. VE have powerful context. Users can control time, scale
and physics.
VE can be tailored to individuals. Tools for movement and manipulation within the virtual
world can be configured to the physical needs of the
individual and the requirements of the task.
2.2 Virtual Environments as an Active Learning Medium
In a learning process, learners should be active rather than passive (Moore et al., 2007). Self-
directed learners are often active learners where they seek to learn new information and find
ways to put it to use. Figure 1 shows a clear comparison of learning methods from (Edger,
1969). The statistic for reading is 10% of remembrance, while for reading and hearing words
is 20% of remembrance for hearing. Base on this, it explains why most of the students in
school do not do well in their study. Every individual is different in nature, some can
remember more by watching, or doing, or hearing, or teaching or playing. This is the part
where each individual has to discover oneself which will help him/her the most in learning.
Figure 1: Audio-Visual Methods in Teaching.
The use of multimedia and virtual environments in learning process have been extensive, as it
has been effective in increasing productivity and retention rates, where research has shown
that people remember 20% of what they see, 40% of what they see and hear, but about 75%
of what they see and hear and do simultaneously (Lindstrom, 1994). The combination of
these elements ensures active learning which promises better understanding and retention for
the learners.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 319
3. Collaboration Between CBL and VE in Learning Process
Computer Based Learning (CBL) is associated with VE because of its special features
compared to other conventional learning media. According to Ruzic (1999), the situated
nature of learning in VE, and consequently the potential for transfer to similar real
environments, suggested that the advantages of VE-based teaching are individualized,
interactive and realistic training. VE is successfully utilized in a broad spectrum of areas like
operation of engineering facilities, manufacturing machines, vehicle driving, piloting, traffic
and flight control, maintenance simulators, medical procedures and military operations (Helin
et al., 2007). The usage of VE as a learning tool in these areas has been accepted and
common.
VE is a kind of simulation where 3D dynamic graphics are developed to create a
realistic-looking world. As a synthetic environment, users enable to immerse in this created
environment. Moreover, the synthetic environment is not static, but a real-time, dynamic
and interactive system to the users (Appino et al., 1992). The opportunities provided by VE
such as able to give realistic visualization, exploration, manipulation by users and computer
generated interaction within the environment, hypothesized that the environment can be an
excellent tool to be used in the learning process.
According to Mikropoulos et al. (1997), the most important reasons for the use of VE in
learning are as follow:
- VE allows extreme close-up examination of an object.
- VE allows learners to proceed through an experience at their own pace.
- The learning provides experience with new technologies through actual use.
- The environment provides interaction which encourages active participation for the
learners.
- VE allows expandability to an immersive and telepresence system.
Table 2: Applications Using VE for CBL
Developer Name of Application Objectives Intended Audience
Carneigie Mellon
University,
SIMLAB, Pitsburg,
PA
Virtual Egyptian
Temple
Understanding of Greek
culture.
Middle High School
Carneigie Mellon
University,
SIMLAB, Pitsburg,
PA
Virtual Bicycle Train and rehabilitate
young bicycle users.
5-15 years
Oregon State
University, School
of Education
Science Education
World
Conceptual
understanding of nature
and experimental
method.
High School
University of
Nottingham,
VIRART Group
(UK)
Makaton World Teaches Makaton
symbols and associated
sign language.
Severely learning
disabled children
University of
Nottingham,
VIRART Group
(UK)
AVATAR House Supports developments
of concentration skills,
improved attention span,
self-confidence.
Autistic children
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 320
4. Persuasive Technology
Persuasive technology or more especially persuasive computer is an interactive technology
that can change a persons attitudes or behaviors (Fogg, 2002). This technology is regularly
used in many areas such as sales, religion, military training, public health and management,
and also in virtual reality or virtual environments. Persuasive technology which is also known
as captology focuses on computational technologies including desktop computers (Oinas-
Kukkonen et al., 2008). Figure 2 shows the captology concept which is represented by the
overlapping components of computers and persuasion.
Figure 2: Captology areas
4.1 How Can User Be Persuaded?
In Persuasive technology, several principles of persuasion were introduced. These principles
were used in implementation and to change users attitude or behaviours towards a learning
process. Kaptein et al., (2009) summarized Cialdinis six principles of persuasion. The six
principles are as listed below:
1. Principle of reciprocation: People feel obligated to return a favour.
2. Principle of scarcity: When something is scarce, people will value it more.
3. Principle of authority: When a request is made by legitimate authority, people are
inclined to follow the request.
4. Principle of commitment and consistency: People do as they told they would.
5. Principle of consensus: People do as other people do.
6. Principle of liking: We say yes to people we like.
In fact, designers of persuasive system should adapt principles and strategies of
persuasion in order to maximize the benefits and users understanding in learning process.
Due to the objectives, Berdichevsky & Neuenschwander (1999) proposed a framework for
analyzing acts of persuasion according to the motivations, methods and outcomes (see figure
3).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 321
Figure 3: Framework of motivations, methods and outcomes
4.2 Relationships between Persuasive technology and Virtual Environments
According to Fogg (2002), through Persuasive technology there are three ways where
computers can change people's lives. In line with that, virtual environment is also capable to
change peoples lives and the summaries of the relation between Persuasive and VE
technologies are shown in Table 3.
Table 3: Relation between Persuasive and VE
Persuasive Technology Virtual Environments
They can make it easier for people to do
things by making things easier, either by
giving people shortcuts to annoying
processes or by reminding them that it's time
to exercise.
VE for learning can be means of enhancing,
motivating and stimulating learners
understanding of certain events, especially
those for which the traditional notion of
instructional learning have proven
inappropriate or difficult (Pan et al., 2006).
They can provide an experience, allowing
people to explore cause-and-effect
relationships.
VE offer the possibility to recreate the real
world as it is or to create completely new
worlds, providing experiences that can help
people in understanding concepts as well as
learning to perform specific tasks, where the
task can be repeated as often as required and
in a safe environment (Chittaro & Ranon,
2007).
They can create relationships, either with
other people or with the program.
Relationship with virtual environments as an
educational tool, (VE) or any other media
immersion should allow a student to actively
become part of learning and reviewing
process. (Shaffer, 2002)
From Table 3, we found that both of technologies have the same objectives and steps
in changing and increasing users perception and understanding. It shows that VE has
potential in persuading users, especially in learning process.
5. Conclusion
This paper has given a review of VE and persuasive technology used for learning process.
We first started by examining the definition of VE and the potential of using VE as a learning
tool. As CBL, VE provides active learning to the users where the users can fully interact with
the learning environment. Previously developed application proved that VE is important in
CBL. From the literature, VE also has potential in persuading users in changing their
perception about learning which is related with an infant technology such as persuasive
technology. Hence, both technologies were investigated for similarities and strength to
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 322
change the users perception towards learning. As discussed earlier, both technologies have
attractive relationship to improve the quality of learning process. Considering all the above-
mentioned factors, there is definite evidence to suggest that Virtual Environments can be used
as aids in persuading users in learning process.
References
Appino, P., Lewis, J., Koved, L., Ling, D., Rabenhorst, D., & Codella, C. (1992). An
architecture for virtual worlds. Presence: Teleoperators and Virtual Environments,
1(1), 1-17.
Berdichevsky, D., & Neuenschwander, E. (1999). Toward an ethics of persuasive technology.
Communications of the ACM, 42(5), 51-58.
Bricken, M. (1991). Virtual reality learning environments: potentials and challenges. ACM
SIGGRAPH Computer Graphics, 25(3), 178-184.
Chittaro, L., & Ranon, R. (2007). Web3D technologies in learning, education and training:
Motivations, issues, opportunities. Computers & Education, 49(1), 3-18.
Dalgarno, B., Hedberg, J., & Harper, B. (2002). The contribution of 3D environments to
conceptual understanding. Paper presented at the Proceedings of ASCILITE 2002
Conference.
Edgar, D. (1969). Audio-Visual Methods in Teaching. Holt, Rinehart, and Winston.
Fogg, B. (2002). Persuasive technology: using computers to change what we think and do.
Ubiquity, 2002(December), 2.
Gasparyan, A. (2007). Cost-Efficient Video Interactions for Virtual Training Environment.
Bowling Green State University.
Helin, K., Evil, T., Viitaniemi, J., Aromaa, S., Kilpelinen, P., Rannanjrvi, L., et al. (2007).
New Human-Centred Design Method and Virtual Environments in the Design of
Vehicular Working Machine Interfaces.
Kalawsky, R. (1993). The science of virtual reality and virtual environments: a technical,
scientific and engineering reference on virtual environments: Addison Wesley
Publishing Company.
Kaptein, M., Markopoulos, P., de Ruyter, B., & Aarts, E. (2009). Can you be persuaded?
Individual differences in susceptibility to persuasion. Human-Computer Interaction
INTERACT 2009, 115-118.
Laws R.J.,(1996). Comparing Virtual Reality Toolkits:MSc diss.,University of Hull
Lindstrom, R. (1994). The Business Week Guide to multimedia presentations: Create
dynamic presentations that inspire: New York: McGraw-Hill.
Mikropoulos, T., Chalkidis, A., Katsikis, A., Kossivaki, Ph., (1997). Virtual realities in
environmental education: the project LAKE. Education and Information Technologies
2, 131142.
Moore, A., Fowler, S., & Watson, C. (2007). Active Learning and Technology: Designing
Change for Faculty, Students, and Institutions. Educause Review, 10.
Neo, T., Neo, M., & Teoh, B. (2007). Designing a CD based learning environment for a
multimedia animation course: A Malaysian experience.
Oinas-Kukkonen, H., Hasle, P., Harjumaa, M., Segersthl, K., hrstrm, P. (Eds.). (2008).
Proceedings of Persuasive Technology: Third International Conference. Oulu,
Finland, June 4-6, 2008. Lecture Notes in Computer Science. Springer.
Pan, Z., Cheok, A., Yang, H., Zhu, J., & Shi, J. (2006). Virtual reality and mixed reality for
virtual learning environments. Computers & Graphics, 30(1), 20-28.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 323
Roussos, M., Johnson, A., Moher, T., Leigh, J., Vasilakis, C., & Barnes, C. (1999). Learning
and building together in an immersive virtual world. Presence: Teleoperators &
Virtual Environments, 8(3), 247-263.
Ruzic, F. (1999) The future of learning in virtual reality environments. In: Selinger, M. and
Pearson, J., (Eds.) Telematics in Education: Trends and Issues, Amsterdam:
Pergamon.
Shaffer, J. (2002). Virtual Reality In Education. [Online]
http://www.newhorizons.org/strategies/technology/shaffer.htm
Stone, R. (2001). Virtual reality for interactive training: an industrial practitioners viewpoint.
International Journal of Human-Computer Studies, 55(4), 699-711.
Whitelock, D., Brna, P., & Holland, S. (1996). What is the value of virtual reality for
conceptual learning? Towards a theoretical framework.
Winn, W. (1993). A conceptual basis for educational applications of virtual reality. Technical
Publication R-93-9, Human Interface Technology Laboratory of the Washington
Technology Center, Seattle: University of Washington.
Ying-Chen L. Milbrath, Mable B. Kinzie (2000). Computer Technology Training for
Prospective Teachers: Computer Attitudes and Perceived Self-Efficacy. Journal of
Technology and Teacher Education.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 324
KESAN TERHADAP PENGINDEKSAN IMEJ BERDASARKAN FAKTOR
JUMLAH TEKS PERSEKITARAN YANG DIAMBIL KIRA
Azilawati Azizan
Jabatan Sains Komputer, Fakulti Sains Komputer & Matematik
Universiti Teknologi MARA (UiTM) Perak, Malaysia
azila899@perak.uitm.edu.my
Abstrak
Sebuah sistem capaian imej yang lengkap mempunyai beberapa modul asas, antaranya ialah
modul pengekstrakan imej dan ciri-cirinya, pengindeksan, pemangkatan, pemanipulasian
kueri pengguna dan modul persembahan hasil carian. Fokus dalam kertas kerja ini ialah pada
modul pengindeksan. Perkara yang dikaji adalah sejauh manakah faktor jumlah bilangan teks
persekitaran imej yang diambil kira dalam sesebuah dokumen HTML dalam web akan
memberi kesan terhadap penghasilan indeks imej. Indeks yang terhasil dapat dilihat
perbezaan kesannya dengan melihat tahap kerelevanan capaian imej yang diperolehi. Sebuah
sistem prototaip dibangunkan bagi tujuan untuk mendapatkan jawapan dari persoalan yang
timbul. Satu siri ujian dilakukan dengan mengambil kira beberapa jumlah perkataan yang
berbeza-beza iaitu 5, 10, 20 dan 30 jumlah perkataan sebelum dan selepas imej. Hasil dari
kajian ini menunjukkan bahawa persepsi yang mengatakan perkataan yang paling dekat
dengan imej akan memberi makna yang signifikan kepada imej tersebut adalah kurang tepat.
Manakala persepsi bahawa makin banyak perkataan yang diambil kira akan juga memberi
makna yang signifikan terhadap imej tersebut, adalah juga kurang tepat. Selain dari itu hasil
penyelidikan ini juga akan memberi satu pengukuhan kepada penggunaan faktor teks
persekitaran sama ada faktor ini sangat memberi kesan atau tidak terhadap model capaian
imej.
Kata kunci: Capaian Imej, Pengindeksan, Kejituan-Dapatan Semula
1. Pendahuluan
Pengguna dari pelbagai bidang cuba mengeksploitasi semaksimum mungkin peluang yang
ada bersama dengan perkembangan teknologi komputer dan Internet untuk meningkatkan
keupayaan pencapaian imej. Sehubungan itu ramai yang mendapati bidang ini masih ditahap
yang kurang memuaskan jika dibandingkan dengan bidang capaian teks.
Hasil capaian imej yang relevan bergantung kepada beberapa faktor. Antara faktor-
faktornya ialah pengekstrakan imej dan maklumatnya, penganotasian dan pengindeksan imej,
pemanipulasian kueri dan pemangkatan imej.
Pada asasnya, faktor paling utama yang sangat memberi kesan terhadap penghasilan
capaian imej yang baik ialah faktor penganotasian imej itu sendiri. Teknik menganotasikan
imej boleh dipelbagaikan. Banyak penyelidikan dibuat untuk mencuba pelbagai teknik bagi
mendapatkan hasil anotasi imej yang sempurna. Faktor kedua yang sangat berkait rapat
dengan penganotasian imej ialah cara bagaimana imej tersebut diindeks. Ini kerana dari
indeks yang terhasil akan membolehkan jentera capaian membuat carian yang relevan dengan
kueri yang diutarakan oleh pengguna.
Dalam kajian ini, penulis cuba mengkaji teknik penganotasian imej bagi tujuan
pengindeksan dan akan mengusulkan pendekatan yang sesuai bagi mendapatkan hasil capaian
yang mempunyai tahap relevan yang tinggi.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 325
2. Penyataan Masalah
Terdapat dua kaedah utama yang boleh digunakan untuk membangunkan sistem capaian imej
iaitu berasaskan kandungan (content-based) atau berasaskan tekstual (context-based).
Kebanyakan kajian dan sistem capaian yang dibangunkan pada awal perkembangan bidang
ini ialah menggunakan kaedah berasaskan kandungan. Kaedah atau pendekatan ini juga
dikenali sebagai kaedah pengekstrakan ciri-ciri asas atau ciri peringkat rendah imej, iaitu
seperti warna, bentuk dan tekstur imej.
Tetapi daripada hasil kajian yang dilakukan ke atas kehendak pengguna, didapati
kebanyakkan pengguna sistem carian imej lebih berminat untuk mencari imej berdasarkan
semantik entiti dan bukannya berdasarkan maklumat visual seperti warna, bentuk mahupun
tekstur (Markkulla and Sormunen, 2000). Ini bermaksud pengguna lebih gemar membuat
carian menggunakan kata kunci seperti epal atau buah berbanding carian berdasarkan
warna merah atau bentuk bulat. Namun terdapat juga penyelidikan terkini yang
menggabungkan kedua-dua kaedah tersebut (Sclaroff 1999). Walaupun begitu, kaedah
capaian berasaskan tekstual atau lebih merujuk kepada teknik capaian teks konvensional
masih lagi sangat popular dalam kalangan penyelidik di dalam bidang ini.
Pendekatan kaedah berasaskan maklumat tekstual bagi capaian imej sangat
memerlukan penghuraian teks secara ekslusif mengenai imej tersebut. Namun begitu, apa
yang berlaku ialah selalunya terlalu sedikit maklumat teks yang boleh digunakan untuk
menghuraikan imej tersebut. Tidak kiralah sama imej tersebut dalam dokumen di web atau
pun imej dalam pangkalan data.
Skop kajian ini hanya melibatkan imej dalam dokumen web yang berformat HTML.
Ini kerana kebanyakkan dokumen dalam Internet disimpan dalam bentuk HTML kerana ia
merupakan satu bahasa yang mudah dan sesuai untuk hiperteks dan juga multimedia (Baeza-
Yates, 1999). Fokus permasalahan kajian ini juga lebih tertumpu pada komponen
pengindeksan imej, di mana ia akan melibatkan persoalan bagaimana untuk menghasilkan
indeks yang lengkap, sempurna dan bermakna. Ini kerana indeks yang sempurna dan
eksklusif sangat memberi kesan terhadap hasil capaian yang dibuat.
Menjawab kepada persoalan yang timbul, penulis cuba untuk mengeksploitasikan
kaedah berasaskan teks, dengan mengambil kira perkataan yang berada di sekitar imej dalam
sesebuah dokumen imej. Selain dari itu persoalan utama disini ialah, berapa banyak perkataan
disekitar imej tersebut yang harus diambil kira untuk dianalisa? Adakah satu perkataan
sebelum dan selepas imej, satu perenggan sebelum atau selepas imej atau keseluruhan
perkataan di dalam dokumen imej tersebut?
3. Kaedah Penyelidikan
Bagi menjalankan penyelidikan ini, penulis telah menetapkan 4 peringkat utama, iaitu
peringkat Perolehan Pengetahuan, peringkat Pembangunan Sistem, peringkat Analisis Hasil
Kajian dan peringkat Dokumentasi Kajian.
Peringkat perolehan pengetahuan, merupakan peringkat pertama dan penting, kerana
ia merupakan titik permulaan bagi menjalankan kajian ini. Antara aktiviti yang terlibat ialah
pencarian maklumat mengenai sistem sedia ada, metodologi yang diguna pakai, perbandingan
kajian-kajian lepas dan penguasaan bidang melalui pembacaan kertas-kertas jurnal yang telah
diterbitkan dan juga buku-buku yang berkaitan.
Peringkat kedua - pembangunan sistem, merupakan peringkat pembinaan sistem
prototaip, dan penulis menggunakan metodologi pembangunan sistem yang biasanya
digunakan untuk pembangunan sistem maklumat iaitu, SDLC (System Development Life
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 326
Cycle). Metodologi ini mengandungi 5 fasa utama iaitu, Perancangan, Analisis Keperluan,
Rekabentuk Sistem, Implimentasi dan Pengujian, Operasi dan Penyelenggaraan..
Peringkat ketiga analisis hasil kajian, melibatkan pengujian terhadap sistem
prototaip yang dibangunkan dengan sampel imej dan kueri yang dipilih. Aktiviti yang
dijalankan ialah pertamanya mendapatkan sampel imej (test data) dari dokumen web. Setelah
itu beberapa sampel kueri ditetapkan dan seterusnya dengan menggunakan sistem prototaip
yang telah dibangunkan, kueri diajukan dan hasil carian imej direkod. Bagi setiap hasil carian
dari kueri yang diajukan, akan dikira dapatan semula (recall) dan kejituannya (precision).
Proses kueri dan analisis hasil (pengiraan dapatan semula dan kejituan) ini akan
diulang untuk beberapa kes. Kes pertama - bilangan perkataan yang diambil kira disekitar
(sebelum dan selepas) imej untuk diindeks ialah sebanyak 5 perkataan, kes kedua - 10
perkataan, kes ketiga - 20 perkataan dan kes keempat - 30 perkataan diambil. Seterusnya graf
diplot bagi melihat kejituan hasil capaian imej berbanding dapatan semula berdasarkan kes-
kes tersebut.
Peringkat keempat - dokumentasi kajian merupakan aktiviti terakhir dalam kajian ini.
Segala teknik, kaedah serta aktiviti yang dijalankan sepanjang penyelidikan
didokumentasikan agar ia dapat membantu kajian akan datang dan juga lanjutan penyelidikan
ini jika ada di masa hadapan.
3.1 Senibina Sistem
Bagi tujuan untuk menguji idea yang disarankan dalam kajian ini, sebuah sistem carian imej
prototaip dibangunkan. Sistem prototaip ini mempunyai elemen-elemen utama yang biasanya
terdapat dalam sesebuah sistem capaian imej, antaranya ialah pangkalan data, repositori
dokumen HTML, modul pengekstrakan imej dan ciri-ciri imej, modul pengindeksan, modul
pemangkatan, pemprosesan kueri dan akhirnya antaramuka pengguna. Semua elemen ini
saling berkait dan setiap satunya mempunyai fungsi yang tertentu. Senibina sistem ini
digambarkan dalam Rajah 1di bawah.
Rajah 1 : Senibina Sistem Prototaip
Seperti yang dapat dilihat pada Rajah 1, modul pertama dalam senibina sistem
tersebut ialah pengesktrakan ciri-ciri, di mana ia melibatkan pengekstrakan imej dan teks dari
dokumen HTML yang diperolehi dari web. Imej yang disimpan hanyalah yang berformat
jpeg dan bersaiz 100 kb ke atas. Aktiviti semasa mengekstrak imej digambarkan pada Rajah
5.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 327
Teks yang diesktrak dan disimpan pula ialah perkataan-perkataan yang berada
berdekatan atau disekitar imej dalam dokumen tersebut mengikut bilangan yang tertentu.
Teks yang mempunyai kaitan dengan imej juga disimpan seperti nama fail imej, alt tag
imej, tajuk dokumen dan teks khas dalam struktur HTML (bold, italic, heading, strong).
Semasa proses pengekstrakan teks ini berjalan, semua kata henti (stop word) diabaikan.
Seterusnya semua teks yang telah disimpan tadi diumpukkan pemberat dalam pangkalan data.
Nilai pemberat yang digunakan adalah seperti pada Jadual 1. Nilai-nilai pemberat ini
dipilih secara heuristik bergantung kepada kepentingan dan kebergunaannya dalam sesebuah
teks dokumen HTML. Skema pemberat tersebut telah dicadangkan dalam laporan teknikal
Frankel (1996) dan prosiding Rowe (1997).
Jadual 1: Nilai Pemberat bagi Tag Khas HTML
Tag Khas HTML Pemberat
Tag alt pada imej 6.00
Title 5.00
H1 4.00
H2 3.60
H3 3.35
H4 2.40
H5 2.30
H6 2.20
B 3.00
Em 2.70
I 2.70
Strong 2.50
(tiada tag) 1.00
Pemberat yang diumpukkan bagi perkataan yang berada disekitar imej pula
menggunakan formula yang telah dicadangkan oleh Sclaroff (1999), iaitu seperti berikut:
Formula ini adalah berdasarkan satu heuristik mudah oleh Sclaroff (1999) iaitu, perkataan
yang terdapat berdekatan dengan imej dalam dokumen HTML adalah berkait rapat dan
menerangkan mengenai imej tersebut. Usul kajian ini adalah berdasarkan formula tersebut
(Sclaroff 1999), iaitu untuk mengkaji sekiranya nilai pada dist, iaitu bilangan maksimum
perkataan yang diambil kira untuk diindeks akan memberi kesan pada hasil capaian ataupun
tidak.
Seterusnya modul kedua dalam senibina sistem prototaip ialah modul pemprosesan
ciri, yang mana ia melibatkan proses pengindeksan (indexing) dan pemangkatan (ranking).
Aktiviti pertama yang terlibat dalam proses pengindeksan, ialah membangunkan fail
songsang (inverse document), yang akan digunakan untuk mendapatkan nilai songsangan
frekuensi imej dalam koleksi dokumen. Kaedah ini asasnya dari formula tf.idf (term
frequency-inverse document frequency) yang mana ia merupakan formula asas bagi capaian
teks dalam dokumen. Tetapi dalam kajian ini, formula tersebut diaplikasikan pada kiraan
imej. Formula yang dimaksudkan adalah seperti berikut:
. e
2.0 * pos/ dist
= 5.0
pos = kedudukan perkataan merujuk kepada imej
dist = bilangan maksimum perkataan yang diambil kira
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 328
(w
iq
* w
ij
)
\
(w
iq
) * (w
ij
)
Kesamaan (Q,D) =
t
t
t
Seterusnya bagi memperkayakan lagi nilai pemberat, penulis menambah formula pemberat
lokal seperti berikut:
Akhirnya kedua-dua formula pemberat yang dinyatakan digabungkan dan menghasilkan
formula terbitan seperti dicadangkan oleh Shahrul et al (2008) seperti berikut:
Modul seterusnya ialah modul pemangkatan. Pemangkatan bermaksud untuk
menyusun hasil carian berdasarkan kueri yang diajukan. Bagi menyusun hasil carian, ia
memerlukan formula tertentu bagi mendapatkan nilai pangkatan. Kajian ini menggunakan
pendekatan Vector Space Model (VSM) dan pengukuran pangkatan dikira menggunakan
Cosine Coefficient Similarity Measures seperti berikut:
Modul yang seterusnya ialah modul pemprosesan kueri. Pendekatan yang digunakan
dalam proses pemangkatan akan mempengaruhi cara pemprosesan kueri dibuat. Kueri
pengguna dipersembahkan dalam bentuk vektor kepada terma. Ini disesuaikan dengan
pendekatan Vector Space Model yang digunakan dalam modul pemangkatan.
4. Perbincangan
Keseluruhan sistem prototaip ini telah dibangunkan menggunakan Visual Basic 6.0. Bagi
melihat hasil pegujian, sistem prototaip yang dibangunkan mempunyai dua modul
antaramuka yang utama iaitu bahagian pengindeksan dan bahagian membuat carian serta
L(w) =
Y
y
log
Y = nilai pemberat terma yang bergantung kepada
kedudukannya dalam dokumen HTML
y = bilangan pemberat terma
tk = terma k bagi imej Pi
tfik = frekuensi terma tk dalam dokumen Di
idfk = songsangan frekuensi dokumen bagi terma tk
dalam C
N = jumlah bilangan dokumen dalam koleksi, C
nk = bilangan dokumen dalam C yang mempunyai
terma tk
idfk = log (N/nk)
W
ik
= tf
ik
* idf
k
W
ik
= tf
ik
* idf
k
+ L(w)
0.5 +
0.5 freq
iq
maxfreq
q
X IDFi
W
iq
=
Wij = freqij X IDFi
freqiq = frekuensi terma i dalam kueri q
maxfreqq = frekuensi maksimum bagi mana-mana terma dalam
kueri q
IDFi = songsangan frekuensi imej bagi terma i dalam
koleksi imej
freqij = frekuensi terma i dalam imej
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 329
memaparkan hasil carian. Sampel antaramuka yang dibangunkan adalah seperti pada Rajah 2,
Rajah 3 dan Rajah 4.
Rajah 2 : Sampel Antaramuka Pengekstrakan Teks Bagi Tujuan Proses Pengindeksan.
Rajah 3 : Sampel Senarai Indeks yang Terhasil dari proses Pengindeksan.
Rajah 4 : Sampel Antaramuka bahagian Carian dan Hasil Carian.
Bagi menjalankan analisis kajian, hasil carian dari sistem prototaip diplotkan pada
graf berdasarkan kejituan hasil carian lawan dapatan semula. Formula yang digunakan bagi
mendapatkan kejituan dan dapatan semula adalah seperti berikut:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 330
Penilaian dibuat berdasarkan hasil graf dan dibandingkan dengan perkataan yang
diambil kira dalam jumlah yang berbeza-beza (5, 10, 20 dan 30 jumlah perkataan sebelum
dan selepas imej). Seterusnya semua nilai kejituan dan dapatan semula ini dipuratakan bagi
melihat secara keseluruhannya. Hasil graf yang diperolehi adalah seperti pada Rajah 5.
Rajah 5 : Graf Purata Kejituan Dapatan Semula
Hasil dari graf Purata Kejituan - Dapatan Semula menunjukkan bahawa corak atau
paten bagi keempat-empat pembolehubah yang digunakan adalah hampir sama, di mana
hanya sedikit perbezaan nilai sahaja antara satu sama lain. Namun jika dilihat secara teliti,
didapati indeks dengan jumlah 20 perkataan yang diambil sebelum dan selepas imej
mengatasi di banyak tempat berbanding hasil indeks yang lain. Jika dikira purata keseluruhan
juga menunjukkan bahawa indeks dengan 20 perkataan adalah yang paling tinggi secara
puratanya, manakala indeks dengan jumlah 30 perkataan adalah paling rendah.
Pembolehubah bagi indeks berjumlah 10 perkataan merupakan kedua tertinggi dan indeks
berjumlah 5 perkataan selepasnya. Penerangan ini dapat difahami dengan jelas dengan
merujuk pada Rajah 6 dan Rajah 7.
Rajah 6 : Graf Purata Dapatan Semula ddan Purata Dapatan Semula Keseluruhan
K E J IT UAN - DAPAT AN S E MUL A (PURAT A)
0,00
0,10
0,20
0,30
0,40
0,50
0,60
0,70
0,80
0,90
1,00
0,00 0,10 0,20 0,30 0,40 0,50 0,60 0,70 0,80 0,90 1,00
DAPATAN S E MUL A
K
E
J
I
T
U
A
N
index 5
index 10
index 20
index 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
D
a
p
a
t
a
n
s
e
m
u
l
a
imej ke-i
PURATA-DAPATAN SEMULA
purata recall-
index 5
purata recall-
index10
purata recall-
index20
purata recall-
index 30
DAPATAN S EMUL A - PURATA
KES EL URUHAN
0,40
0,41
0,42
0,43
0,44
0,45
0,46
0,47
index 5 index 10 index20 index30
d
a
p
a
t
a
n
s
e
m
u
l
a
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 331
Rajah 7 : Graf Purata Kejituan dan Purata Kejituan Keseluruhan
5. Kesimpulan
Kajian ini dilakukan bertujuan untuk mengkaji kesan terhadap pemanipulasian penggunaan
perkataan disekitar imej dalam sesebuah dokumen HTML untuk diambil kira bagi
menghasilkan indeks yang bermakna.
Hasil daripada analisis kajian ini, didapati jika perkataan disekitar imej diambil dalam
jumlah yang terlalu sedikit, ia tidak akan dapat memberi penerangan yang bermakna bagi
imej tersebut. Manakala sekiranya jumlah perkataan yang diambil disekitar imej terlalu
banyak pula, juga tidak akan dapat membantu untuk memberi penerangan tentang imej
tersebut. Sekaligus ia tidak dapat membantu dalam menghasilkan nilai indeks yang bagus
untuk tujuan mendapatkan hasil capaian yang mempunyai tahap kerelevanan yang tinggi.
Ini dibuktikan dengan hasil yang diperolehi dari kajian ini dengan menggunakan
pemboleh ubah bagi jumlah bilangan perkataan yang berbeza-beza, iaitu 5, 10, 20 dan 30
jumlah perkataan yang diambil untuk diindeks bagi menerangkan imej dalam dokumen web
tersebut.
Hasil dari kajian ini juga telah mengubah anggapan awal yang mengatakan perkataan
yang paling dekat dengan imej akan memberi makna yang signifikan kepada imej tersebut
adalah kurang tepat dan juga anggapan bahawa makin banyak perkataan yang diambil kira
dalam sesebuah dokumen untuk diindeks akan juga memberi makna yang signifikan terhadap
imej tersebut adalah juga kurang tepat.
Kajian ini juga berjaya menghasilkan satu indeks terma yang menggunakan beberapa
pendekatan formula yang telah dimurnikan. Pada masa hadapan kajian ini dapat
dikembangkan lagi dengan mengambil kira hubungan semantiknya yang wujud antara
perkataan/ teks-teks lain yang disekitarnya bagi menambah nilai bermakna bagi tujuan
meningkatkan kerelevanan capaian imej yangdilakukan.
Rujukan
Baeza-Yates, R. & Ribeiro-Neto, B. 1999. Modern Information Retrieval. New York:
Addison Wesley.
Besser, H. 1990. Visual access to visual images: the UC Berkeley Image Database Project.
Library Trends. 38(4), pp 787-798.
Cascia, M.L., Saratendu Sethi & Stan Sclaroff. 1998. Combining Textual and Visual Cues for
Content-based Image Retrieval on the World Wide Web. Technical Report BU CS
TR98-004, Computer Science Department, University of Boston.
PURATA
KEJITUAN
0,00
0,10
0,20
0,30
0,40
0,50
0,60
0,70
0,80
0,90
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
imej ke-
i
kejituan
purata-index 5
purata-index 10
purata-index 20
purata-index 30
K E J ITUAN - PUR ATA K E S E L UR UHAN
0,50
0,51
0,52
0,53
0,54
0,55
0,56
0,57
0,58
0,59
0,60
index 5 index 10 index 20 index 30
k
e
j
i
t
u
a
n
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 332
Eakins, J.P & Graham, M.E. 1999. Content-based Image Retrieval A report to the JISC
Technology Applications Programme. Institue for Image Data Research, University of
Northumbria Newcastle.
Frakes, W.B., & Baeza-Yates, R. 1992. Information Retrieval: Data Structures and
Algorithms. New Jersey: Prentice Hall.
Gudivada, V. & Raghavan, V. 1995. Content-Based Image Retrieval System. IEEE
Computers, 28(9) pp 18-22.
Markkula, M., Sormunen, E. 2000. End-User Searching Challenges Indexing Practices in the
Digital Newspaper Photo Archive. Information Retrieval 1(4), 259-285.
Rowe N. C. & Frew B. 1997. Distinguishing the Picture Captions on the World Wide Web.
Proc. Of the 2nd ACM International Conference on Digital Libraries, hlm. 263-263.
Salton, G. & Buckley C. 1988. Term-Weighting Approaches in Automatic Text Retrieval.
Information Processing and Management, 24(5), 513-23.
Salton, G. & McGill, M.J. 1983. Introduction to Modern Information Retrieval. McGraw
Hill. Computer Science Series.
Sclaroff, S. 1995. World Wide Web Image Search Engines. Technical Report TR95-016,
Computer Science Dept, University of Boston.
Sclaroff, S., Marco La Cascia, Saratendu Sethi & Leonid Taycher. August 1999. Unifying
Textual and Visual Cues for Content-Based Image Retrieval on the World Wide Web.
Computer Vision and Image Understanding, 75(1/2), pg 86-98.
Shahrul Azman M.N., Azilawati A., Tengku Mohd, T.S. & Tengku Siti Meriam, T.W. 2008.
Exploiting Surrounding Text for Retrieving Web Images. Journal of Computer
Science, 4(10): 842-846.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 333
ON RIJNDAEL CRYPTOGRAPHY USING BASIS CONVERSION
Andry Alamsyah
1
, Intan Muchtadi
2
1
Department of Informatics Engineering, Indonesian Computer University
Jl. Dipati Ukur No. 112 Bandung Indonesia,
andry.alamsyah@gmail.com
2
Algebra Research Group, Faculty of Mathematics and Natural Sciences,
Institut Teknologi Bandung,
Jl. Ganesha No. 10 Bandung 40132 Indonesia,
ntan@math.itb.ac.id
Abstract
The Advanced Encryption Standard (AES) is one of the most popular algorithms used
in symmetric key cryptography and is available in many different encryption packages. It has
been standardised by the National Institute of Standards and Technology of the United States
(NIST) and comprises three block ciphers, AES-128, AES-192 and AES-256 (using 128,
192, 256-bit key respectively), adopted from Rijndael algorithm. An efficient implementation
of binary field arithmetic is an important prerequisite in Rijndael because Rijndael operations
are performed using arithmetic operations in the underlying field. Two of the most common
basis used in binary elds are polynomial basis and normal basis. In normal basis, raising to
the 2
th
power is just a cyclic shift of the coordinates and therefore essentially free. One of the
step in Rijndael algorithm is BytesSub which consists of inversion and affine transformation.
In this paper we propose algorithms to speed up the encryption/decryption process in
Rijndael. To be more precise we propose the use of storage efficient basis conversion from
polynomial basis into normal basis and vice versa and the use of inversion algorithm in
normal basis.
Keywords: Rijndael, encryption-decryption, normal basis, basis conversion,
inversion
1. Introduction
Rijndael algorithm consists of BytesSub, ShiftRow, MixColumns, and AddRoundKey, that are
substitutions and permutations. The different transformations operate on the intermediate
result, called the State. It is pictured as a rectangular array of bytes.
We particularly interested in BytesSub transformation process which consists of
inversion and affine transformation, operating on each of the State bytes independently. The
substitution table (or S-box) is invertible and is constructed by the composition of two
transformations (inversion and affine).
Many AES architectures attempt compaction of the S-box ([17],[14], [2]) or the
inverse function to improve the overall performance. The S-box operation is the largest
device and requires more area in general than the other operations. Different approaches have
been attempted for S-box compaction varying from the use of subelds [13] to the use of
lookup techniques. Recent approaches have made use of lookup for the S-box [11] but this
tends to consume large amounts of area. For this reason research into optimization of the S-
box [3] is important in its own right.
As bytes representing elements in the finite field GF(2
8
), many attempts are to
be made to get efficient software and hardware implementations of the basic arithmetic
operations (addition, multiplication and inversion) in the eld GF(2
8
). Finite field arithmetic
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 334
can be further classified according the choice of basis for representing elements of the finite
field: two common choices are polynomial basis and normal basis.
The normal basis especially are known to be more efficient for hardware
implementation than polynomial basis because the inversion can be achieved by repeated
multiplication typically using the method of Itoh and Tsujii [7], and doubling can be executed
by only one cyclic shift operation. The mathematical symbols of normal basis may seem
overly complex, but the implementation in computer hardware or software is easy. Only
AND, EXOR, and, ROTATE operations are needed. The fact that these are fastest operation
possible on any microprocessor is what makes normal basis so attractive [12].
In this paper we propose storage efficient basis conversion algorithm as modification
of [9] and Itoh and Tsujiis inversion algorithm [7] to speed up the encryption/decryption
process in Rijndael, and especially in AES. To be more precise we propose the use of basis
conversion from polynomial basis into normal basis and the use of normal basis inversion
algorithm in BytesSub. In normal basis, raising to the 2
th
power is just a cyclic shift of the
coordinates and therefore essentially free. As the Itoh and Tsujiis method of inversion
basically consists of cyclic shifting and some multiplication, it can speed up the inversion
process in BytesSub.
This paper is organized as following: in section 2 we give mathematical backgrounds.
In section 3 we provide the basis conversion algorithms. The inversion algorithm be given in
section 4, and its use in Rijndael in section 5. In the last section we give conclusion and
suggestions for further research.
2. Background
Several operations in Rijndael are defined at byte level, with bytes representing
elements in the finite field GF(2
8
).
A byte b, consisting of bits a
7
a
6
a
5
a
4
a
3
a
2
a
1
a
0
, is considered as a polynomial with
coefficient in {0,1}: a
0
+ a
1
x + a
2
x
2
+ a
3
x
3
+ a
4
x
4
+ a
5
x
5
+ a
6
x
6
+a
7
x
7
.
For example, the byte with hexadecimal value 57 (binary 01010111) corresponds with
polynomial 1 + x + x
2
+ x
4
+x
6
.
2.1 Addition
In the polynomial representation, the sum of two elements is the polynomial with
coefficients that are given by the sum modulo 2 (i.e., 1 + 1 = 0) of the coefficients of the two
terms. For example, ( x
6
+ x
4
+ x
2
+ x + 1 ) + ( x
7
+ x + 1) = x
7
+ x
6
+ x
4
+ x
2
.
In binary notation we have: 01010111 + 10000011 = 11010100. Clearly, the
addition corresponds with the simple bitwise EXOR at the byte level. As every element is its
own additive inverse, subtraction and addition are the same.
2.2 Multiplication
In the polynomial representation, multiplication in GF(2
8
) corresponds with
multiplication of polynomials modulo an irreducible polynomial of degree 8, i.e. a
polynomial that has no divisors other than 1 and itself. For Rijndael, this polynomial is given
by
m(x ) = x
8
+ x
4
+ x
3
+ x + 1.
For example:
(x
6
+ x
4
+ x
2
+ x + 1) ( x
7
+ x + 1) = x
13
+ x
11
+ x
9
+ x
8
+ x
7
+ x
7
+ x
5
+ x
3
+ x
2
+ x + x
6
+ x
4
+ x
2
+ x + 1
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 335
= x
13
+ x
11
+ x
9
+ x
8
+ x
6
+ x
5
+ x
4
+ x
3
+ 1
x
13
+ x
11
+ x
9
+ x
8
+ x
6
+ x
5
+ x
4
+ x
3
+ 1 modulo x
8
+ x
4
+ x
3
+ x + 1 = x
7
+ x
6
+ 1
Clearly, the result will be a binary polynomial of degree below 8. Unlike for addition,
there is no simple operation at byte level. For any binary polynomial b(x) of degree below 8,
the extended algorithm of Euclid can be used to compute polynomials a(x), c(x) such that
b(x)a(x) + m(x)c(x) = 1
Hence, a(x) b(x) mod m(x)= 1 or b
1
(x) = a(x) mod m(x)
Moreover, it holds that a(x) (b(x) + c(x)) = a(x ) b(x) + a(x) c(x ). It follows
that the set of 256 possible byte values, with the EXOR as addition and the multiplication
defined as above has the structure of the finite field.
2.3 Basis
A basis for GF(2
8
) is a set of 8 elements v
0
, v
1
, , v
7
in GF(2
8
) such that every
element of the finite field can be written uniquely as a linear combination of basis elements,
i.e., given w in GF(2
8
), we can write
=
=
7
0
] [
i
i
v i B w ,
where B[0],,B[7] GF(2) are the coefficients. The row vector B=(B[0],,B[7]) is
called the representation of the element w in the basis v
0
,v
1
, v
7
.
Two common choices of basis are polynomial basis and normal basis. A polynomial basis
in GF(2
8
) is a basis of the form {1,x, x
2
,, x
7
}, i.e., v
i
= x
i
, powers of the generator x.
A normal basis in GF(2
8
) is a basis of the form {x, x
2
, x
2^2
,, x
2^7
} , i.e., v
i
= x
2^i
,
exponentiation of the generator x. A normal basis exists for all finite fields (see [10, Theorem
2.35]). In normal basis, raising to the 2
th
power is just a cyclic shift of the coordinates and
therefore essentially free.
The normal basis especially are known to be more efficient for hardware implementation
than polynomial basis because the inversion can be achieved by repeated multiplication
typically using the method of Itoh and Tsujii [7], and doubling can be executed by only one
cyclic shift operation. The mathematical symbols of normal basis may seem overly complex,
but the implementation in computer hardware or software is easy. Only AND, XOR, and,
ROTATE operations are needed. The fact that these are fastest operation possible on any
microprocessor is what makes normal basis so attractive [12].
A combination of both normal basis and polynomial basis can take advantage of the
strength of each for maximum efficiency.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 336
3. Conversion Algorithm
The basis conversion is to compute the representation of an element of a finite field in one
basis, given its representation in another basis. The general solution is to apply the change-of-
basis matrix relating the two basis. Suppose that we are converting from the representation B
of w in the basis v
0
, v
1
, , v
7
to another basis. The representation A of w in the second basis
can be computed as the matrix product
A
t
= MB
t
,
where M is an matrix whose columns are the representation of v
i
in the second basis
and we view A and B as row vectors of dimension n. We can convert in the reverse direction
by computing
B
t
= M
-1
A
t
.
The matrix M is called the transition matrix from normal basis to polynomial basis and M
-1
is called the transition matrix from polynomial basis to normal basis. As the matrix M is
potentially quite large, here we propose a modification of [9] to convert from one basis to
another without involving a large amount of storage or requiring a large number of
operations. Using the properties of normal basis and field operations, we obtain the following
conversion algorithms.
3.1 Storage efficient algorithm
We will make use of these two lemmas:
Lemma 2 Let B be a normal basis representation of an element w, and let B be a normal
basis representation of the element w
2
-1) mod
8].
Lemma 3 Let x be the generator of a polynomial basis, A be a polynomial basis
representation of an element w and A be a polynomial basis representation of the element
wx
-1
. Then for all 0 < i< n-1, A[i] = A[i+1], provided that A[0] = 0.
Lemma 2 shows that if the basis is a normal basis, then squaring rotates the coefficients
up. Lemma 3 shows that if the basis is a polynomial basis, then multiplication by the inverse
x
-1
of the generator x shifts the coefficients down, provided that the coefficient at index 0 is
initially 0. Using only the last row of the matrix M
-1
and Lemma 2 we obtain POLY to NB
algorithm and using only the first row of the matrix M and Lemma 3 we obtain NB to POLY
algorithm.
3.2.1. Polynomial Basis to Normal Basis
Input: A=(A[0],,A[7]), the representation of an element in polynomial basis.
Output: B=(B[0],,B[7]), the representation of the same element in normal basis.
FOR i = 7 downto 0 DO
B[i] 0
FOR j=7 downto 0 DO
B[i] A[j] M
-1
[7,j] + B[i]
ENDFOR
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 337
A A
2
ENDFOR
Note: To obtain A
2
, notice that if
=
=
7
0
] [
i
i
x i B w , then
=
=
7
0
2 2
] [
i
i
x i B w . The representation of
x
2i
for i=4,,7 is the following:
x x x x x
x x x x x
x x x x x
x x x x
rep x i
i
+ + +
+ + + +
+ + +
+ + +
3 4 7 14
3 5 7 12
2 3 5 6 10
3 4 8
2
7
1 6
5
1 4
3.2.2. Normal Basis to Polynomial Basis
Input: B=(B[0],,B[7]), the representation of an element in normal basis.
Output: A=(A[0],,A[7]), the representation of the same element in polynomial basis.
Constant: X
-1
which is the representation of x
-1
in normal basis
FOR i = 0 to 7 DO
A[i] 0
FOR j= 0 to 7 DO
A[i] = B[j] M[0,j] + A[i]
ENDFOR
B B - (A[i],, A[i])
B B X
-1
ENDFOR
4. Inversion Algorithm
Efforts in developing normal basis multiplicative inversion algorithms in finite fields
GF(2
8
) have produced only a limited number of choices. Al-Somani and Amin [1] made a
survey and comparison between different inversion algorithms in normal basis, such as the
method of Wang et. al. [15], Itoh and Tsujii [7], Feng [5], Fenn [6] et al, Jimenez Calvo and
Torres [8] and Yen [16]. The exponent decomposing inversion algorithm of Itoh and Tsujii,
however, is found to be the best requiring only log
2
(m-1) multiplications, hence the most efficient.
The algorithm is shown in the following (taken from [4]):
Input : A
Output : L = A
-1
S := [log
2
(7)] - 1
P := A
for i := S downto 0 do
R := Shift(7) to right by S bits
Q := P
Rotate Q to left by [R/2] bits
T := PQ
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 338
if last bit of R = 1 then
Rotate T to left by 1 bit
P := TA
else
P := T
end if
S := S - 1
end for
Rotate P to the left by 1 bit
L := P
return L
The Itoh-Tsujii algorithm achieves inversion by computing the exponential A
-1
=A
2^8-2
,
using a clever recursive decomposition technique applied on the exponent. The efficiency of
the algorithm is based on the efficient squaring property of the normal basis and on the
reduction of the number of required multiplications to O (log m). It must be noted that the
shift (left, right) and rotate operations in the algorithm refer to a bit ordering from 7 down to
0.
5. BytesSub using Normal Basis Inversion
The first step of Rijndael algorithm is the BytesSub which consists of inversion of each
bytes of array and an affine transformation. Given an element A in GF(2
8
), one may convert
A into normal basis representation then finding its inverse using the methods in previous
sections.
The next step can be done by either converting back into polynomial basis representation
first or doing all the rest of the steps using normal basis representation then convert it later.
6. Conclusion
We have described in this paper a combination of several algorithms; basis conversion and
inversion in normal basis. These algorithms are theoretically efficient since they involve
primarily finite-field operations, and applicable to AES in particular in BytesSub which
consists of inversion and affine transformation.
For further research, one may try to modify the S-BOX used in BytesSub by
using converted basis in affine transformation, and also to build some implementation of this
combination of algorithms, in order to compare the Rijndael without normal basis and with
normal basis. Another direction is by using the composite fields. As GF(2
8
) is isomorphic to
NB
representation
Inverse in NB
rep
PB
representation
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 339
the composite field GF((2
2
)
4
), one may also try to use composite field algorithms and some
modification on polynomial-normal basis conversion in AES especially in BytesSub and Mix
Columns.
References
T. F. Al-Somani and A.Amin, Hardware Implementations of. GF(2m) Arithmetic using
Normal Basis, Journal of Applied Sciences 6 (6): 1362-1372, 2006.
F. Burns, J. Murphy, A. Koelmans and A. Yakovlev, "Efficient AES LookUp implementation
using Normal Basis" Technical Report Series, School of Electrical, Electronic and
Computer Engineering, Merz Court, University of Newcastle Upon Tyne, 2008.
D. Canright, A Very compact S-box for AES, Proc. 7th Int. Workshop on Cryptographic
Hardware and Embedded Systems (CHES 2005), LCNS 3659, pp. 441-455, 2005.
J. P. Deschamps, J.L. Imana and G.D. Sutter "Hardware Implementation of Finite-Field
Arithmetic". McGraw-Hill, 2009.
G.L. Feng. A VLSI Architecture for Fast Inversion in GF (2m). IEEE Trans. Computers, 38: 1383-
1386, 1989.
S.T.J. Fenn, M. Benaissa and D. Taylor. Fast normal basis inversion in GF (2m). Electronics Lett.,
32: 17, 1996.
T. Itoh and S. Tsujii "A Fast Algorithm for Computing Multiplicatives Inverse in GF(2m)
Using Normal Basis" Information and Computing, vol. 78, pp. 171-177, 1988
I. Jimenez Calvo, and M. Torres. Complexity of the inversion in GE (2m). Electronics Letters, 1997.
B. Kaliski, Y.L.Yin, Storage-efcient nite eld basis conversion, in S.Tavares and H.Meijer
(Eds.): SAC98, LCNS 156, 81-93, 1999.
R. Lidl and H. Niederreiter, Harald, Finite Fields, volume 20 of Encyclopedia of
Mathematics and Its Applications, Addison-Wesley, 1983.
M. McLoone and J. McCanny, Rijndael FPGA Implementation utilizing Look-Up Tables,
Journal of VLSI Signal Processing Systems, Vol 34, no. 3, Aug. 2003.
M. Rosing, Implementing Elliptic Curve Cryptography, Manning Publications Co., 1999.
S. Tillich, M. Feldhofer and J. Grosch adl, Area, Delay, and Power Characteristics of
Standard-Cell Implementations of the AES S-box, Proc. Embedded Computer
Systems: Architectures, Model ling, and Simulation, LNCS 4017, pp. 457-466, Jul.
2006.
Verbauwhede, P. Schaumont and H. Kuo, Design and Performance Testing of a 2.29 GB/s
Rijndael Processor, IEEE Journal of Solid-State Circuits, Vol. 38, no. 3, Mar. 2003.
C.C.Wang, T.K. Truong, H.M. Shao, L.J. Deutsch, J.K. Omura and I. Reed. VLSI architectures for
computing multiplications and inverses in GF (2m). IEEE Trans. Comput., 34: 709-716,
1985.
S. Yen. Improved normal basis inversion in GF (2m). Electronics Lett., 33: 1 96-1 97, 1997.
N. Yu and H. Heys, Investigation of Compact Hardware Implementation of the Advanced
Encryption Standard, Proc. IEEE Conf. CCECE., Saskatoon, Saskatchewan, pp.
1069-1072, May 2005.
340
KESAN LAMAN WEB DAN BLOG ISLAM TERHADAP KEFAHAMAN FEKAH:
TINJAUAN TERHADAP PELAJAR DAN KAKITANGAN UNIVERSITI MALAYSIA
PAHANG
Tuan Sidek Tuan Muda
a
, Abdullah Mat Sapri
b
,
Ahmad Fazullah Mohd Zainal Abidin
a
& Ahmad Ibrahim
a
a
Pusat Bahasa Moden & Sains Kemanusiaan
b
Fakulti Sains Komputer dan Kejuruteraan Perisian
Universiti Malaysia Pahang
Lebuhraya Tun Razak, Gambang, 26300 Kuantan, Pahang, Malaysia
sidek@ump.edu.my, abdullah@ump.edu.my, fazullah@ump.edu.my, ahmad@ump.edu.my
Abstrak
Teknologi komunikasi dan maklumat (ICT) memainkan peranan yang penting di dalam
penyaluran dan perkongsian maklumat. Salah satu bentuk perkongsian yang mudah ialah
melalui laman web dan blog. Pelbagai berita, maklumat, pandangan, kritikan hinggalah
kepada gosip dan fitnah dapat diperolehi dan dikongsi dengan mudah antara satu sama lain.
Tidak terkecuali dalam hal yang berkait dengan Islam dan ajarannya. Mutakhir, banyak blog
dan laman web Islam yang muncul. Terdapat laman web rasmi jabatan-jabatan agama,
pertubuhan-pertubuhan Islam dan banyak juga blog persendirian. Masing-masing mempunyai
fokus yang pelbagai. Ada yang menumpukan kepada isu semasa, ada yang memfokuskan
kepada perbahasan fekah dan hukum-hakam, kewangan Islam, aqidah, politik dan pelbagai
lagi secara khusus. Banyak juga yang menyentuh pelbagai aspek ajaran Islam tanpa
membuat pengkhususan dalam bidang-bidang tertentu. Apapun, tidak dapat dinafikan, blog-
blog juga cenderung untuk mempromosikan aliran pemikiran mereka. Secara umumnya,
dengan wujudnya laman-laman web dan blog-blog ini, agak mudah bagi sesiapa yang
mempunyai capaian internet untuk mendapatkan maklumat mengenai Islam. Tulisan ini
adalah bertujuan untuk menilai sejauh mana peranan laman-laman web dan blog-blog ini
dalam membantu meningkatkan kefahaman masyarakat terhadap Islam khususnya fekah.
Skop kajian dalam tulisan ini menumpukan kepada capaian maklumat berkenaan Islam yang
diperolehi menerusi medium-medium internet sama ada di pejabat atau di rumah khususnya
di kalangan kakitangan dan pelajar Universiti Malaysia Pahang. Adalah diharapkan tulisan ini
dapat memberikan manfaat kepada semua pihak dalam membantu memperkasakan
metodologi penyampaian ajaran Islam secara lebih efektif, telus dan mudah kepada
masyarakat.
Kata kunci: Teknologi Komunikasi dan Maklumat (ICT); Kefahaman fekah; Islam.
1. Pengenalan
Dunia pada hari ini mengalami satu proses globalisasi yang diistilahkan sebagai dunia
tanpa sempadan. Proses ini melibatkan evolusi pembangunan dan perkembangan media
massa berasaskan teknologi komunikasi dan maklumat (ICT) yang bergerak begitu pantas
dan pesat. Ini dapat diperhatikan melalui pelbagai pembangunan aplikasi ICT yang
berasaskan sains dan teknologi khususnya internet di alam siber. Internet memperluaskan
skop pemindahan ilmu dan maklumat yang merangkumi sistem media massa yang sedia ada
kepada sistem media massa bentuk baru. Laman-laman web yang sedia ada seperti
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 341
penggunaan homepage, portal, aplikasi e-mel sehinggalah kepada jaringan laman web sosial
seperti blog, facebook, twitter kini semakin popular apabila para penulisnya menjadikan
medium itu sebagai wadah untuk melontarkan idea sama ada menulis pandangan peribadi
mahupun pelbagai ilmu dan maklumat.
Sesungguhnya, media massa bentuk baru ini telah diiktiraf sebagai medium
penyampaian maklumat terkini kepada masyarakat dunia. Penggunaannya semakin meluas
sehingga mampu mempengaruhi pemikiran dan tingkah laku manusia. Gambaran maklumat
dan informasi yang dipaparkan berupaya mempengaruhi minda, pemikiran dan seterusnya
membawa kepada tindakan-tindakan tertentu. (Abdul Razak Abdul Mutalib & Ezry Fahmy
Eddy Yusof, 2009).
Konsep dan aplikasi ICT tidak dapat dipisahkan daripada cara hidup Islam malah
seiring dengan perkembangan semasa. Medium ICT digunakan dalam pengurusan dan
penyampaian ilmu dan maklumat berkenaan dengan ajaran Islam yang merangkumi aspek
prinsip-prinsip asas Islam seperti aqidah, ibadah, syariah dan akhlak. Laman-laman web dan
blog digunakan secara meluas dalam penyampaian ilmu Islam bermula daripada
penyampaian asas Islam sehinggalah kepada perbincangan tentang isu hukum-hakam,
pendidikan, dakwah, isu-isu semasa dan sebagainya.
2. Media Massa Sebagai Medium Penyampaian Dakwah
Kaedah perlu disesuaikan dengan kesesuaian zaman. Oleh itu, pada hari ini, akibat
daripada kemajuan ICT, dakwah juga telah mengalami satu bentuk transformasi daripada segi
kaedah penyampaian. Ia melibatkan media komunikasi secara interaksi dua hala yang lebih
pantas dan cepat tanpa memerlukan proses pergerakan yang banyak oleh pendakwah dan
kumpulan sasaran (daie dan madu). Ini tidak bermakna proses dakwah yang sedia ada tidak
relevan lagi, tetapi kaedah penyampaian sahaja yang dipelbagaikan bagi memberi ruang dan
peluang penyampaian secara lebih praktikal dan berkesan. Kaedah penyampaian dakwah
yang telah diperkenalkan melalui sistem sains, teknologi dan ICT iaitu dikenali sebagai
sistem e-Dakwah (electronic-Dakwah). Melalui sistem ini, intipati ajaran Islam dapat
disebarkan dan disampaikan kepada masyarakat dengan dengan lebih kreatif, inovatif, cepat
dan pantas. Beberapa laman web Islam sama ada laman web rasmi mahupun blog-blog
peribadi yang berbicara mengenai Islam telah banyak wujud dalam talian internet
menekankan pelbagai bidang ajaran Islam seperti bidang politik, ekonomi, sosial,
perundangan, pendidikan, isu-isu kontemporari dan sebagainya. Antara laman web yang
berada di atas talian (online) ialah www.e-ulama/org, www. e-pondok. net, www. islam. gov
dan www. ikim .gov, www.islam-com, dan lain-lain.
Di samping itu, laman-laman web dan blog Islamik tersebut ditambah dengan
pelbagai fungsi dan aplikasi yang dapat dimuatkan dalam laman web tersebut seperti
hyperlink, multimedia, muat turun (download), muat naik (upload), ruangan chatting,
ruangan tazkirah, ceramah, bacaan al-Quran oleh para qari terpilih, ruangan soal jawab
(FAQ- Frequently Asked Question), ruangan maklumat mengenai ketamadunan Islam dan
sebagainya. untuk menyebarkan maklumat tentang kebudayaan, kesenian dan seni bina Islam
dan sebagainya. Para pembaca dan pendakwah boleh menjawab persoalan dan kemusykilan
agama melalui ruangan forum (Nor Raudah Hj Siren, 2006).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 342
3. Institusi Pendidikan Islam Sebagai Pusat Penyampaian Ilmu
Pengajian tentang ilmu-ilmu Islam sentiasa mengalami perubahan dari sudut kaedah
penyampaian. Berdasarkan kepada sejarah, perubahan kaedah penyampaian boleh
dibahagikan kepada peringkat-peringkat berikut (S.Salahudin Suyurno, 2004):-
PERINGKAT JENIS INSTITUSI
Peringkat awal Islam
Zaman Rasulullah S.A.W.
(609-632M), Zaman Khulafa
al-Rashidin (632-661)
a) Dar al-Arqam
Di rumah Arqam bin Abi al-Arqam (al-Safa, Mekah). Peringkat
awal bilangan sahabat hanya sedikit hinggalah bertambah menjadi
38 orang (golongan bangsawan Quraisy, pedagang dan hamba
sahaya)
b) Masjid
Antara fungsi masjid ialah sebagai pusat penyebaran dakwah dan
ilmu Islam, pusat kaunseling dan khidmat masyarakat, rumah
tetamu dan duta-duta asing, tempat pertemuan pemimpin-pemimpin
Islam, persidangan Qadi, dan pusat pengajian (madrasah) bagi
kanak-kanak mempelajari ilmu agama.
Masjid Quba merupakan masjid pertama di Madinah. Rasulullah
mengajar dalam bentuk halaqah. Masjid-masjid lain seperti (Masjid
al-Haram, Masjid al-Nabawi, Masjid Kufah, Masjid Basrah dan
lain-lain).
c) Suffah
Ruang atau bangunan surau yang bersambung dengan masjid untuk
kegiatan pembelajaran seperti di Masjid al-Nabawi.
d) Kuttab
Sebagai pusat pra-persekolahan bagi kanak-kanak. Ia mula
ditubuhkan oleh orang Arab sebelum kedatangan Islam untuk
memberi pendidikan kanak-kanak peringkat rendah. Sebelum
kedatangan Islam hanya 17 orang Quraisy boleh membaca.
Peringkat Kedua /
Pertengahan
Zaman kerajaan Umaiyah
(662-750M) dan
Zaman Abbasiyah (751-
1258M)
a) Manazil Ulama dan istana-istana
Contoh: Rumah Ibnu Sina, Muhammad Ibnu Tahir Bahrom dan
Abu Sulayman. Khalifah Muawiyah Abi Sufian kerap kali
menjemput ulama ke istananya untuk membincangkan sejarah
peperangan, sejarah raja-raja Farsi, bangsa Arab dan sistem
pemerintahan negara.
b) Perpustakaan
Perpustakaan Umum
Baitul Hikmah merupakan perpustakaan pertama telah didirikan
oleh Khalifah Harun al-Rasyid di Kota Baghdad. Sebagai
gedung buku dari pelbagai bahasa (Greek, Parsi, Hindu, Latin
dan lain-lain). Darul Hikmah (395M) di Kaherah didirikan oleh
Kahlifah Hakim Amrillah. Contoh lain Perpustakaan Madrasah
Nizamiah oleh Nizam al-Muluk di Baghdad.
Perpustakaan Semi-Umum
Kepunyaan Khalifah atau raja dan didirikan di dalam Istana.
Hanya untuk golongan tertentu sahaja. Contoh, kerajaan
Fatimiyah mendirikan perpustakaan yang besar di istana
Kaherah untuk menyaingi perpustakaan khalifah di Baghdad.
Perpustakaan Khusus
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 343
Perpustakaan persendirian contoh perpustakaan al-Fathu Ibnu
Khakam, Jamaluddin al-Qafathi. Imaduddin Asfahani, Hunain
Ibnu Ishaq dan lain-lain.
c) Madrasah
Mula didirikan akhir abad ke 4H (10M). Khalifah pada zaman
Abasiyah mendirikan madrasah seperti di Madinah, Basrah, Kufah,
Baghdad dan Qahirah. Subjek yang diajar termasuk Matematik,
kimia, Falsafah, Mantiq, Astronomi dan lain-lain.
Madrasah Baihaqiyah merupakan madrasah yang pertama didirikan
oleh penduduk Naisabur.Antara contoh madrasah ialah Madrasah
Nizamiyyah (Baghdad), al-Nasiriyah (Kaherah), al-Nuriah
(Damsyik) al-Muntasiriyah (Baghdad). Ia menjadi asas kepada
penubuhan Jamiah al-Azhar yang merupakan universiti pertama
yang didirikan oleh orang Islam pada akhir abad ke 4H (10M).
4. Institusi Pendidikan Islam di Malaysia
PERINGKAT JENIS INSTITUSI
Peringkat Sebelum
Kemerdekaan
a) Rumah-Rumah Imam atau Guru
Kanak-kanak berumur 6 tahun di kelas al-Quran. Guru daripada Arab, Parsi,
India dan lain-lain. Bermula selepas solat Subuh, Zuhur atau Maghrib.
Pelajar diajar membaca al-Quran. Pendidikan Islam di Tanah Melayu
bermula sebelum abad ke 15.
b) Institusi Pondok
al-Funduq bermaksud rumah tumpangan, hotel atau asrama. Merupakan
institusi terawal yang di pelopori oleh ulama yang berpendidikan dari
Patani.
Kaedah pembelajaran dan pengajaran adalah secara halaqah dan masa
pengajian bergantung kepada kemajuan prestasi pelajar. Pondok
berkembang di Kelantan, Terengganu, Kedah, Pulau Pinang dan Perak.
Contoh pondok di Kelantan (Pondok Tok Pulau Chondong, 1820. Pondok
Kertam 1937-1972, Pondok Tok Bachok 1900, Pondok Ketereh dan lain-
lain). Di Terengganu (Pondok Losong, Pondok Hj. Muhammad Endut.
Pondok Hj. Hussain, Pondok Hj. Abdul Latif dan lain-lain). Di Kedah
(Pondok Kubang Kota, Pondok Gajah Mati, Pondok Sheikh Hj. Abdullah
dan lain-lain).
c) Madrasah
Wujud awal abad ke 20 hasil gerakan Islam dari Timur Tengah. Lebih
bersistematik berbanding sistem pondok, Bahasa Arab sebagai bahasa
pengantar, sukatan silibus (rendah ibtidaie, menengah Thanawi dan
pengkhususan). Kurikulum termasuk Ilmu fardu Ain dan fardu Kifayah
seperti Bahasa Arab, #Ilmu Hisab, Ilmu Alam dan lain-lain. Contoh
madrasah: Madrasah al-Misriyah (Bukit Mertajam), Madrasah al-Khairiyah
al-Islamiyah, Madrasah al-Manshur.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 344
Peringkat Selepas
Kemerdekaan
a) Sekolah-Sekolah Agama
Sekolah Agama Kementerian Pendidikan (SMKA)
Di bawah kelolaan Kementerian Pendidikan, contohnya, Kolej Islam
Sultan Alam Shah, Sekolah Menengah Agama Simpang Lima dan lain-
lain.
Sekolah Agama Kerajaan Negeri (SAN)
Dikelolakan oleh Kerajaan Negeri melalui majlis atau jabatan agama
negeri contohnya, Sekolah Menengah Agama Seri Desa Tg. Karang,
Sekolah Menengah Agama Sultan Salahuddin Bt. 38 Sabak Bernam,
Sekolah Menengah Agama Hishamuddin Klang dan lain-lain.
Sekolah Agama Rakyat (SAR)
Didirikan oleh rakyat dan ditadbir melalui lembaga pentadbiran.
Menerima sumber kewangan daripada Kerajaan Pusat, Negeri, Majlis
Agama Islam atau Baitul Mal. Contohnya ialah Markaz Tahfiz al-Quran
wa al-Qiraat Li al Banat Klang.
b) Institusi Pengajian Tinggi
Kewujudan sekolah-sekolah agama mendorong kepada penawaran kursus
dan pendidikan Islam melalui Akademi Pengajian Islam, Universiti Malaya
(UM), Fakulti Pengajian Islam, Universiti Kebangsaan Malaysia (UKM)
(1970), serta Universiti Islam Antarabangsa (UIA) (1983), Universiti Sains
Islam Malaysia (USIM), kolej-kolej universiti yang menawarkan program
pengajian Islam.
Bagi mempastikan perkembangan bidang dalam pengajian Islam sama ada dalam
bidang aqidah, ibadah, syariah dan akhlak dan bidang-bidang tumpuan Islam yang lain seperti
pengajian Usuluddin dan Perbandingan Agama, Syariah dan Undang-Undang, Al-Quran dan
Al-Hadis, Fiqh dan Usul Al-Fiqh, Dakwah, Ketamadunan dan sebagainya seharusnya perlu
merentasi zaman. Merentasi zaman dan sempadan geografi adalah mengikuti peredaran
zaman dari segi kaedah penyampaian. Pengajian ilmu-ilmu Islam yang berbentuk tradisional
dikekalkan dan ditambahbaik malah diberi nafas baru dengan diperkukuhkan dengan
pengunaan sarana sains dan teknologi ICT. Kemunculan aplikasi dan kaedah penyampaian
yang mengunakan pelbagai bahan-bahan rujukan canggih dan maya (online) membolehkan
ilmu-ilmu Islam disampaikan secara lebih berkesan dan pantas.
5. Analisis Data
Kajian yang dijalankan bertujuan untuk menilai sejauh mana peranan laman-laman
web dan blog-blog ini dalam membantu meningkatkan kefahaman masyarakat terhadap Islam
khususnya fekah. Fekah adalah salah satu daripada cabang ilmu Islam. Fekah bermaksud
Ilmu berkaitan hukum syara yang berbentuk amali yang diistinbatkan daripada dalil-dalil
yang terperinci (Wahbah al-Zuhaili, 1989). Dalam bahasa yang lebih mudah, fekah ialah
bidang yang berkaitan dengan hukum hakam seperti sembahyang itu wajib berdasarkan
kepada dalilnya iaitu firman Allah yang bermaksud: Dan dirikanlah kamu akan sembahyang
dan keluarkanlah zakat dan rukuklah kamu semua bersama orang yang rukuk. (al-Baqarah
2:43). Begitulah juga dengan hukum hakam lain seperti puasa itu wajib berdasarkan dalilnya,
menggosok gigi sunat muakkad berdasar dalilnya, minum arak haram berdasarkan dalilnya
dan lain-lain lagi.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 345
Skop kajian menumpukan kepada capaian maklumat berkenaan Islam khususnya
fekah yang diperolehi menerusi medium-medium internet sama ada di pejabat atau di rumah
khususnya di kalangan kakitangan dan pelajar Universiti Malaysia Pahang di Kuantan
Pahang. Responden kajian adalah pelajar dan kakitangan universiti. Seramai 200 orang (4%)
daripada 5000 jumlah keseluruhan populasi bagi universiti telah menjawab soalan kaji selidik
ini. Jumlah ini yang diberikan memadai untuk melihat trend atau pola yang ingin ditunjukkan
berkenaan dengan laman web dan blog Islam terhadap kefahaman fekah. Asas yang
menunjukkan sesuatu laman web dan blog selalu dikunjungi dan diminati adalah berkenaan
dengan kadar kunjungan (hit rate) secara atas talian (online).
Jadual 1: Kecenderungan melayari Laman web dan blog Islam
Pernahkah anda melayari sebarang laman web dan blog Islam?
Ya 188 94%
Tidak 12 6%
Jadual 1 menunjukkan kecenderungan responden dalam melayari laman web dan blog
Islam. Melalui kajian pelajar dan kakitangan universiti mengenai tahap mereka melayari
laman web dan blog Islam, sebanyak 6% sahaja yang tidak pernah melayarinya. Ini
menunjukkan data-data yang akan dianalisa selepas ini termasuk di dalam kategori yang
boleh dipercayai dan kesahan data yang tinggi.
Jadual 2: Kekerapan kunjungan ke laman web dan blog Islam
Berapa kerapkah anda melayari laman web dan blog Islam?
Setiap hari 53 29%
1 kali
seminggu
57 31%
1 kali sebulan 40 22%
1 kali setahun 5 3%
Others 27 15%
Jadual 2 menunjukkan bahawa daripada 94% yang mengunjungi laman web dan blog
Islam, 31% melakukannya sekali seminggu, 29% setiap hari dan 22% sekali dalam tempoh
sebulan. Ini menggambarkan bahawa, laman web dan blog Islam juga mendapat tempat untuk
dilawati dan diberikan perhatian oleh pengunjung Internet. Data kajian juga menunjukkan
hanya 18% yang jarang dan kurang melayari laman web dan blog Islam.
Jadual 3: Kunjungan ke laman web dan blog Islam dari segi pilihan bahasa
Bahasa apakah yang menjadi pilihan?
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 346
Bahasa
Melayu
168 89%
Bahasa
Inggeris
13 7%
Bahasa
Arab
4 2%
Others 3 2%
Jadual 3 menunjukkan jenis laman web dan blog islam dari segi pilihan bahasa.
Bahasa yang menjadi pilihan responden adalah laman web dan blog Islam yang disediakan
dalam Bahasa Melayu sebanyak 89%. Bahasa Inggeris sekadar 7% dan diikuti dengan Bahasa
Arab sebanyak 2%. Ini menunjukkan laman web dan blog Islam lebih disenangi dan dilawati
dalam Bahasa Melayu.
Jadual 4: Pilihan laman web dan blog Islam dari segi bidang
Bidang di dalam Islam yang paling digemari untuk dilawati.
Aqidah 96 51%
Ibadah 96 51%
Akhlak 90 48%
Isu Semasa 118 63%
Kewangan dan
Ekonomi
42 22%
Others 12 6%
* Responden boleh memilih
lebih daripada satu bidang, oleh
itu peratusan boleh berjumlah
lebih daripada 100%
Jadual 4 menunjukkan pilihan bidang fekah dalam laman web dan blog Islam. Bagi
laman web dan blog Islam yang paling digemari menunjukkan bidang yang menunjukkan
peratusan tertinggi adalah isu semasa iaitu 63%. Diikuti oleh aqidah dan ibadah sebanyak
51%, akhlak pada 48%, kewangan dan ekonomi pada 22% dan selainnya pada kadar 6%. Ini
memberikan gambaran awal bahawa isu semasa yang berkenaan dengan Islam mendapat
perhatian responden dan lebih digemari berbanding bidang-bidang Islam yang lain.
Jadual 5: Pilihan laman web dan blog Islam dari segi skop bidang fekah
Antara berikut, yang manakah berada di bawah bidang fekah?
Hukum
meminum arak
123 66%
Percaya kepada
malaikat
18 10%
Masalah riba
dan Perbankan
Islam
100 54%
Hukum murtad 71 38%
Kaedah
memelihara hati
27 15%
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 347
* Responden boleh memilih
lebih daripada satu bidang, oleh
itu peratusan boleh berjumlah
lebih daripada 100%
Jadual 5 menunjukkan bidang-bidang fekah yang kerap dilayari oleh responden. Bagi
persoalan bidang fekah yang manakah daripada contoh jawapan yang diberikan, sebanyak
66% mempercayai hukum meminum arak adalah termasuk di dalam bidang fekah, diikuti
54% di dalam masalah riba dan perbankan Islam, kemudian 38% pada hukum murtad. Hanya
sebanyak 10% yang menjawab percaya kepada malaikat adalah termasuk bidang fekah dan
diikuti dengan 15% pada kaedah memelihara hati. Ini menunjukkan, lebih daripada 50%
responden memahami bidang fekah yang mereka lawati pada laman web dan blog Islam dan
hanya bawah 15% sahaja yang tersilap memahami persoalan sesuatu bidang fekah tersebut.
Bolehlah dikatakan bahawa responden laman web dan blog Islam mengetahui asas sesuatu
bidang yang berada pada laman yang dilawati.
Jadual 6: Jenis dan pilihan laman web dan blog Islam
Sila nyatakan laman web dan blog Islam yang biasa dilawati.
IslamOnline.Net 40 26%
Portal Rasmi
JAKIM
37 24%
Al-Ahkam.Net 10 6%
Zaharuddin.Net 64 42%
Saifulislam.Com 65 42%
Others 36 23%
* Responden boleh memilih
lebih daripada satu bidang, oleh
itu peratusan boleh berjumlah
lebih daripada 100%
Jadual 6 menunjukkan jenis dan pilihan laman web dan blog Islam. Laman web dan
blog Islam yang biasa dilawati oleh responden adalah zaharuddin.net dan saifulislam.com
iaitu sebanyak 42%. IslamOnline.net 26%, portal rasmi JAKIM 24%, dan lain-lain 23%.
Responden lebih menggemari untuk melawat laman web dan blog Islam yang disediakan oleh
orang perseorangan yang dianggap mempunyai asas yang baik lebih daripada laman web
rasmi yang disediakan oleh kerajaan atau suatu organisasi Islam yang lain. Antara laman web
dan blog Islam yang dinyatakan oleh responden yang memilih lain-lain (other) sebagai
jawapan adalah islamicity.com, readingislam.com, drmaza.com, ustazazhar.com dan
iluvislam.com.
Jadual 7a: Tahap kefahaman tentang fekah sebelum ke laman web dan blog Islam
Bagaimana tahap kefahaman tentang fekah dalam sesuatu isu sebelum
melayari laman web dan blog Islam?
1 - Kurang faham 19 10%
2 55 29%
3 98 52%
4 15 8%
5 - Sangat faham 2 1%
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 348
Kurang
faham
Sangat
faham
Jadual 7b: Tahap kefahaman tentang fekah selepas ke laman web dan blog Islam
Bagaimana tahap kefahaman tentang fekah dalam sesuatu isu selepas
melayari laman web dan blog Islam?
Kurang
faham
Sangat
faham
1 - Kurang faham 1 1%
2 11 6%
3 70 38%
4 94 51%
5 - Sangat faham 10 5%
Jadual 7a dan Jadual 7b menunjukkan tahap kefahaman tentang fekah sebelum dan
selepas ke laman web dan blog Islam. Responden yang sebelum melayari laman web dan
blog Islam menunjukkan ketidakfahaman kepada permasalahan fekah tentang sesuatu isu
secara umum sebanyak 39% dengan 52% berada pada tahap sederhana. Hanya sebanyak 9%
yang mempunyai kefahaman fekah sebelum melayari laman web dan blog Islam. Selepas
mereka melayari laman web dan blog Islam, kefahaman terhadap permasalahan fekah telah
meningkat kepada 56% yang faham dan sangat faham dengan 38% berada pada tahap
kefahaman sederhana. Hanya 7% yang masih kurang jelas dengan persoalan fekah setelah
melayari laman web dan blog Islam tersebut. Ini menunjukkan peningkatan kefahaman
sebanyak 47%. Peratusan ini boleh dijadikan asas yang memberikan gambaran bahawa laman
web dan blog Islam boleh meningkatkan kefahaman responden berkenaan dengan
permasalahan fekah berbanding sebelumnya.
Jadual 8: Pandangan terhadap laman web dan blog Islam sebagai sumber
rujukan dalam memahami fekah
Pada pendapat anda, adakah laman web dan blog Islam membantu
anda memahami fekah dengan lebih mendalam?
Kurang
setuju
Sangat
setuju
1 - Kurang setuju 1 1%
2 8 4%
3 48 26%
4 83 44%
5 - Sangat setuju 48 26%
Jadual 8 menunjukkan pandangan terhadap laman web dan blog Islam sebagai alat
bantu dalam memahami fekah Hasil analisis data oleh responden menunjukkan 44% setuju
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 349
dan 26% sangat setuju bahawa laman web dan blog Islam membantu mereka memahami
fekah dengan lebih mendalam. Hanya seramai 5% responden yang tidak bersetuju dengan
kenyataan ini. Ini boleh dijadikan asas bahawa laman web dan blog Islam adalah merupakan
pilihan bagi lebih daripada 50% responden untuk mempelajari dan memahami permasalahan
fekah.
Jadual 9: Perbandingan kaedah tradisional dan kaedah ICT dalam laman web dan blog Islam
Adakah anda bersetuju cara tradisional (menadah kitab) sudah tidak
relevan berbanding cara teknologi maya (Internet) dalam
penyampaian ilmu fekah?
Ya 8 4%
Tidak 155 82%
Tidak
pasti
25 13%
Jadual 9 menunjukkan perbandingan kaedah tradisional dan kaedah ICT dalam laman
web dan blog Islam. Walaupun lebih daripada 70% responden bersetuju bahawa laman web
dan blog Islam membantu mereka memahami masalah fekah dengan mendalam, 82%
daripada responden tidak bersetuju bahawa cara tradisional pengajian kitab tidak relevan
berbanding dengan penggunaan teknologi laman web dan blog Islam dalam penyampaian
ilmu fekah. Responden bersetuju cara laman web dan blog Islam membantu kefahaman
mereka, tetapi mereka lebih suka merujuk kepada kefahaman ilmu fekah kepada cara
tradisional dengan menadah kitab dan pengajian di masjid dan surau. Hanya sekadar 4%
bersetuju cara teknologi melalui laman sesawang Islam lebih relevan pada masa kini.
Jadual 10a: Kepuasan dengan jawapan bagi isu fekah dalam laman web dan blog Islam
Adakah anda akan bersetuju dengan jawapan tentang persoalan
fekah yang dijawab menerusi laman web dan blog Islam?
Ya 90 48%
Tidak 13 7%
Tidak
pasti
85 45%
Jadual 10b: Pengamalan dengan jawapan yang diberikan dalam laman web dan blog Islam
Jika anda menjawab 'Ya' bagi soalan di atas, adakah anda akan
mengamalkan jawapan yang diberikan oleh laman web dan blog
Islam tersebut?
Ya 61 49%
Tidak 12 10%
Tidak
pasti
51 41%
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 350
Jadual 10a dan Jadual 10b menunjukkan kepuasan jawapan dan pengamalan dengan
jawapan yang diberikan dalam laman web dan blog Islam tersebut. Seramai 48% daripada
responden bersetuju dengan jawapan tentang persoalan feqah yang diutarakan melalui laman
web dan blog Islam dan daripada angka ini, seramai 49% yang akan mengamalkan apa yang
mereka dapati daripada laman tersebut. Ini menunjukkan 50% daripada responden yang
bersetuju (48%) dengan jawapan persoalan fekah yang mengamalkan apa yang mereka
persetujui oleh jawapan laman tersebut. Angka ini bolehlah dianggap rendah dimana hanya
sekitar 20% sahaja yang mengamalkan apa yang mereka dapati daripada laman web dan blog
Islam yang mengutarakan persoalan fekah. Angka ini juga membenarkan fakta data di atas
yang mana lebih 80% bersetuju bahawa cara tradisional lebih disukai berbanding fakta yang
disediakan oleh laman web dan blog Islam. Mungkin ini disebabkan oleh pembelajaran
masalah fekah lebih sesuai secara berdepan dengan ahli agama berbanding bersoal jawab
secara maya. Secara keseluruhannya, sekadar 7% yang tidak bersetuju dengan persoalan
fekah yang diutarakan di dalam laman web dan blog Islam dan hanya 10% daripada 48%
responden yang tidak akan mengamalkan jawapan bagi persoalan fekah yang diberikan oleh
laman tersebut.
Untuk persoalan kajian ini, terdapat kesan yang signifikan yang diperolehi oleh
responden mengenai laman web dan blog Islam terhadap kefahaman fekah. Responden secara
keseluruhannya mengetahui kewujudan laman web dan blog Islam, menggunakannya untuk
mengetahui dan memahami sesuatu permasalahan hukum dan mengakui terdapat kesan
kepada kefahaman fekah mereka. Lebih daripada 80% daripada responden menyatakan
kaedah memahami fekah melalui belajar dan menadah kitab dengan berguru masih relevan
walaupun hidup di dunia teknologi dan alam maya yang menjadi alat perhubungan dan
penyampaian ilmu pada masa kini. Hampir kebanyakan komen akhir daripada responden
mengakui kelebihan menggunakan laman web dan blog Islam adalah merupakan cara
terpantas untuk mengetahui sesuatu hukum, capaian yang 24 jam seminggu, tidak ramai yang
ingin ke masjid dan surau untuk mengaji ilmu fekah, jawapan bagi setiap persoalan didapati
dengan pantas dan relevannya penggunaannya teknologi terkini untuk berdakwah dan
menyampaikan ilmu dan mesej Islam. Walaupun demikian, responden lebih memahami cara
terbaik menangani permasalahan fekah di dalam laman web dan blog Islam dengan
mempercayainya jika ditulis oleh orang yang berautoriti dan mempunyai sumber rujukan
yang sahih, tidak terus mempercayai dan mengamalkan tanpa merujuk kepada ahli agama di
dunia nyata, memerlukan pengesahan orang yang berilmu di luar atas isu yang dibentangkan,
menggunakan beberapa ruang laman web dan blog Islam untuk kepastian maklumat dan tidak
bergantung sepenuhnya kepada laman tersebut kerana setiap pengendali ada kecenderungan
aliran pemikiran yang memungkinkan mereka membahaskan sesuatu isu mengikut aliran
yang senada dengan mereka sahaja.
6. Rumusan
Kesimpulannya, terdapat kesan yang ketara mengenai laman web dan blog Islam
terhadap kefahaman fekah dan ianya membantu perkembangan ilmu fekah yang
memungkinkan laman teknologi maya menjadi rujukan utama jika ianya disokong dengan
kesahan ilmuan Islam seperti penggunaan video, suara atau integriti maklumat dengan
tambahan elemen keselamatan komputer (computer security). Dari penjelasan yang telah
diberikan, maka dapatlah disimpulkan bahawa:
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 351
i. Penggunaan multimedia dan animasi dalam berdakwah adalah sangat membantu dan
berkesan. Ianya mestilah diterima dengan baik dan dipergunakan sebijak mungkin.
ii. Program-program seperti bengkel dan kursus memberikan dan meningkatkan
kemahiran penggunaan teknologi moden dalam mutimedia di kalangan pendakwah dan
ulama mestilah diadakan dan dipertingkatkan, manakala program pengukuhan ilmu
teras Islam pula diberikan kepada para pakar Muslim dalam bidang multimedia, agar
kepesatan dan keberkesanan dakwah dapat dicapai.
iii. Suatu mekanisme penyelarasan yang berwibawa dan berkesan mestilah dibentuk bagi
mempastikan kegiatan dakwah menerusi multimedia dapat dilaksanakan dengan teratur
dan rapi serta menepati pada sasarannya. Suatu gabungan dan jalinan yang kuat antara
pakar-pakar Muslim dalam pelbagai bidang dan antara institusi dan organisasi Islam
yang berwibawa adalah dinanti-nantikan.
iv. Aspek iman dan taqwa hendaklah menjadi fokus utama dalam menyampaikan dakwah
dan menjadi asas terpenting dalam membena umat Islam yang kuat dan mampu
mengatasi segala cabaran yang dihadapi baik pada masa ini mahupun pada masa akan
datang, samada cabaran dari multimedia sendiri atau lain-lain cabaran yang terdapat
dalam masyarakat.
v. Dalam keghairahan umat Islam mempelajari dan mendalami Islam, kedapatan juga
laman-laman web dan blog-blog yang bertopengkan nama Islam dengan isi
kandungan yang dipaparkan adalah menyeleweng dan menyimpang daripada ajaran
Islam yang sebenarnya. Ini merupakan ancaman dan bahaya penyelewengan dan
penyimpangan fakta yang dilakukan oleh musuh-musuh Islam. Ini akan membawa salah
faham, keraguan, sikap prejudis dan stereotaip oleh para pembaca dan seterusnya akan
membawa kepada kekeliruan dan menjejaskan dari segi pemikiran, kepercayaan aqidah,
pemahaman dan tindakan umat Islam dalam sesuatu perkara agama. Bagi mengatasi hal
ini, umat Islam wajib merujuk kepada pakar dan ilmuwan Islam, seterusnya melaporkan
kepada pihak berwajib di Malaysia (contohnya, pihak JAKIM) dalam menentukan
kesahihan satu-satu perkara dan menyekat penyebaran palsu dalam laman web dan blog
tersebut.
Akhirnya, harus disedari bahawa teknologi informasi dan komunikasi terus
berkembang dengan pesat dalam pelbagai bidang. Para blogger muslim perlu mengikuti serta
menguasai teknologi terkini dengan keupayaan pembalajaran secara gigih dan berterusan.
Kaedah-kaedah baru dari sudut video editing serta kaedah menyematkan klip video dalam
laman blog mungkin akan menyebabkan blog seseorang lebih diminati pengunjung. Ini harus
seiring dengan usaha mereka mencorakkan hasil usaha mereka dengan ciri dan nilai-nilai
keislaman. Dengan pembaharuan yang berterusan kita mungkin dapat menghalakan salah
satu jalur globalisasi ke arah yang menguntungkan Islam dan menyemarakkan dakwah.
Pertarungan sekarang ialah bagaimana kita boleh memenuhkan sebanyak mungkin ruang
siber dengan bahan-bahan yang berguna, mulia dan lohor demi membangun jati diri umat dan
memperkasakan sahsiah Islamiyyah, bahkan manusia seluruhnya agar mereka tidak
tenggelam dan hanyut dalam arus pemodenan negatif serta globalisasi yang tidak
menguntungkan diri, umat dan negara dalam jangka panjang.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 352
7. Rujukan
Abdullah Basmeih, Sheikh. (2002). Tafsir Pimpinan al Rahman kepada Pengertian al-Quran.
Cetakan ke-13. Kuala Lumpur: Penerbit Darulfikir.
Abdul Razak Abdul Mutalib & Ezry Fahmy Eddy Yusof (2009, Julai). Media massa dan
serangan pemikiran. Kertas kerja dibentangkan di National Seminar 2009: Media &
Islamic Thinking (MIST09): Anjuran Fakulti Kepimpinan dan Pengurusan, Universiti
Sains Islam Malaysia, Negeri Sembilan.
Al-Zuhaili, Wahbah (1989), al Fiqh al Islami wa Adillatuh, Cetakan Ketiga, Damsyik:
Penerbit Darul Fikr.
Nor Raudah Hj. Siren (2006). E-Dakwah: kepentingan dan pelaksanaannya di Malaysia.
Dalam Nor Raudah Hj. Siren, Yusmini Mohd Yusof, & Mahmudah Hj. Nawawi (Pnyt.),
Dakwah Islam semasa: konsep dan pelaksanaan. Cet. pertama. Kuala Lumpur: Penerbit
Universiti Malaya.
S.Salahudin Suyurno, et.al (Ketua editor) (2004). Kemasyarakatan dan kenegaraan Islam.
Edaran dalaman. Cet. pertama. Shah Alam Selangor: Centre for Islamic Thought and
Understanding (CITU), Universiti Teknologi MARA (UiTM).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 353
PERFORMANCE EVALUATION OF OPEN-SOURCE DISK IMAGING TOOLS
FOR COLLECTING DIGITAL EVIDENCE
Saufi Bukhari, Ibrahim Yusof & Mohd Fikri Azli Abdullah
Faculty of Information, Science and Technology
Multimedia University (MMU), Malaysia
saufi.bukhari@gmail.com, ibrahim@ibrahimyusof.com
School of Electronics and Computer Engineering
Chonnam National University, South Korea
mfikriazli@gmail.com
Abstract
Disk imaging is the key process of conducting digital forensic investigation whereby digital
evidence is acquired using proper disk imaging tools. Disk imaging tools come in commercial
package and open-source package, each of them offers different features to satisfy
technological needs. Open-source tools are the most preferred to reduce the cost of
conducting investigation. However, not all open-source disk imaging tools satisfy digital
forensic standards because most of the tools are originally designed to image the hard drive
for the purpose of data backup, data recovery, boot image, and other non-forensic based
purposes. Few mandatory and optional requirements of digital forensic standards need to be
satisfied by a particular disk imaging tool to ensure that digital forensic investigation will
produce accurate and reliable outputs without neglecting the performance. This research aims
to evaluate the performance of various open-source disk imaging tools such as dd, dd_rescue,
GNU ddrescue, dcfldd, and aimage. These tools will be tested on the Linux system where the
environment and configurations will be properly controlled which will also include
applicable digital forensic settings of each tool and the result of the test will be analyzed and
simplified for better understanding.
Keywords: Digital Forensics, Digital evidence, Open-Source disk imaging tools.
1. Introduction
Digital forensic is a small branch of forensic science which involves obtaining digital
evidence from digital sources such as computer, PDA, iPod, memory card or stick, and other
digital devices. There are 5 basic methodologies to the digital forensics which are
preparation, collection, examination, analysis, and reporting. The main objective of
performing digital forensic is to explain the current state of a digital artifact which includes
computer system registries, storage medium, digital media or documents, and information
from transmitted packets in the network. However, there are also other purposes of digital
forensic such as to analyze the data or information inside the computer system, to recover lost
or deleted or corrupted data, to analyze how the computer system being compromised by the
hackers, to gather digital evidence, and to understand how the computer system works for the
purpose of debugging, reverse-engineering, and performance optimization.
Forensic disk imaging is the key of conducting digital forensic investigation whereby
the storage medium will be duplicated sector-by-sector rather than separate file while
maintaining the content and the structure of it. Unlike other imaging applications, forensic
imaging also aims to create image of all data including ambient data which refers to data
stored in operating systems swap file, unallocated space and file slack (Saudi, 2001). These
locations are most likely the sources of evidence during forensic investigations. Digital
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 354
evidence can be in many forms such as e-mails, images, logs, documents, history files,
temporary files, audio or video files, and computer memory. These forms of evidence need to
be acquired using digital forensic tools or disk imaging tools and normally being stored as
raw image (.dd or .img) for further analysis.
There are a lot of disk imaging tools available in the market which consists of
commercial and open-source tools. Access Data Forensic Took Kit (FTK) and Guidance
Software EnCase are the most popular and widely used tools in formal forensic investigations
because they integrate many digital forensic tools inside such as disk imaging tool, evidence
analysis tool, case management tool, and investigation documentation. However, neither FTK
nor EnCase are cheap and cannot simply be afforded by small organizations. This is why
open-source tools have been developed, and normally distributed separately as independent
software. Examples of open-source disk imaging tools are dd, aimage, dcfldd, dd_rescue,
guymaker, ewfacquire, and FTK Imager. However, not all open-source tools can be used for
formal digital forensic investigations because some of them do not meet forensic standards.
The best thing about open-source tools is they are totally free and can be redistributed or
extended freely without infringing their copyright. This ensures that digital forensic
investigations cost can be reduced greatly while maintaining the standards and effectiveness.
This paper is created to compare the results of the test of open-source disk imaging
tools in real environment. The tests are conducted on a personal computer whereby the
scenario of digital evidence collection is replicated. The results is analyzed and simplified
into graphs and tables for better understanding. Section 2 describes the digital forensic
technology and section 3 describes the disk imaging technology. The preparations done
before conducting the actual test are described in section 4, and the analysis and results are
documented in section 5.
2. Digital Forensic Technology
Digital forensic is a process of answering questions about the initial and current state of
digital data which involves two major techniques which are dead and live analysis techniques
(Carrier, 2006). Live analysis is a process of performing instant analysis on a particular
system as soon as the attack is reported or detected by the Intrusion Detection System (IDS).
Live analysis is normally being used if the attacked system such as web server and database
server needs to stay running all the time. However, dead analysis is the most widely used
method whereby the systems hard drive will be duplicated and analyzed using proper
forensic tools. The purpose of both techniques is identical which is to analyze for potential
evidence, the only difference is that live analysis techniques rely on the applications that
could possibly being compromised to produce inaccurate data.
2.1. Digital Forensic Process
A standard digital forensic process must include identification, preservation, analysis, and
presentation (Li & Seberry, 2003). In this paper, identification is described as identifying the
evidence to decide appropriate methodologies, preservation is described as preserving the
integrity and maintaining the chain of custody, analysis refers to reviewing and examining the
evidence, and presentation means presenting the evidence in a legally acceptable and
understandable manner. By following the standard process, the possibility of diskovering
useful evidence will be increased and the reliability of the evidence will be preserved and will
be valid in legal proceedings. Similar with other types of forensic, digital forensic must be
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 355
performed by experts who have knowledge and experience because this issue will be
questioned during cases prosecution.
2.2. Digital Evidence
Digital forensic is an application of forensic science intended to preserve, collect, validate,
identify, analysis, interpret, document, and present digital evidence which is obtained from
digital sources such computers and PDAs in order to facilitate or further reconstruct
suspected criminal events or help to anticipate malicious activities (Palmer, 2001). To
achieve these objectives, digital evidence must be obtained properly without damaging or
altering the original source of evidence and at the same time must be as accurate as possible.
Digital evidence mainly extracted from systems storage such as hard disk and memory card,
and can be in many forms such as event logs, cache, readable documents, cookies, and
temporary files. Since digital evidences integrity and confidentiality is crucial, it needs to be
stored in a secured and trusted medium.
There are five rules of forensic evidence which are applicable to digital evidence such
as admissibility (usable in the court or elsewhere), authenticity (relevant relationship of the
evidence with the incident), completeness (consideration and evaluation of all available
evidence), reliability (no doubt on the evidences authenticity and veracity), and believability
(clear presentation, ease of understanding and believable) (Li & Seberry, 2003). However, for
digital evidence, integrity needs to be addressed in the basic rules of evidence because digital
evidence is not presented physically which therefore needs to be verified digitally using hash
or checksum and presented using appropriate tools or computer applications in the court.
3. Disk Imaging Technology
Disk imaging operates below the file-system layer where it does modify not the file-system
accounting time such as modification time, access time, and creation time (Tan, 2001). The
reason to not disturb the file-system accounting is to preserve the integrity of the evidence.
Unlike normal backup, imaging process will also capture deleted data which resides on the
disk. This is one of the key characteristics of disk imaging because potential evidence might
be deleted. However, the weakness of disk imaging is the image size will be exactly the same
as the original. Although compression technique is applicable to the image, the actual size of
the image will remain as it is after extraction. For example, the original image size is 250GB,
therefore will produce 250GB of image file. If compression technique is applied, the size can
be reduced to 100GB provided that not all space inside the original disk is used. But after
being extracted, the compressed image will be completely restored and will produce 250GB
of size, same with the size before compression.
Disk image compression is highly demanded nowadays as the capacity of the hard
disk is increasing rapidly. It is quite troublesome to prepare a large storage to store all images
if the image is not compressed. The advantage of using compression technique is disk space
optimization and in contrast will consume more CPU resources than normal imaging.
Compressed image needs to be decompressed, if a single byte is lost during distribution,
decompression process will be stalled until the byte is successfully acquired (Hibler et al.,
2003). To reduce this risk, image normally will be splitted into several archives and
compressed independently to ensure more robust distribution and more efficient installation
at the expense of the sub-optimal compression. By using this method, archives can be stored
in separate places for convenience because it is not practical to store 250GB disk image as a
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 356
file. In fact, forensic investigation normally will be performed by several investigators;
therefore, it is recommended to assign each of them with different disk archive for efficiency.
3.1. Disk Imaging Performance
In order to handle large hard disk capacity, imaging process should be faster without
disregarding the integrity and accuracy of the image. Despite using file-by-file imaging,
entire hard disk will be read once to analyze allocated space on the disk and imaging will be
performed on allocated space only to speed up imaging process (Saudi, 2001). This is not a
good approach because unallocated space sometimes contains remnant data which normally
left by the applications programs or file system. Remnant data refers to leftover data in which
it is originally a part of something. This data contains useful information that can be
classified as valid evidence. Therefore, a good forensic disk imager will not ignore
unallocated space to maintain the evidences reliability and usefulness.
3.2. Disk Image Integrity
One of the base specifications of disk imaging tool is able to verify the integrity of a disk
image file (Saudi, 2001). In order to do this, hash algorithms such as MD5 and SHA-1, or
checksum such as CRC16 and CRC32 will be calculated before and after the disk image
duplication process is completed and will produce hash value or checksum. Both values will
be compared with each other to check for difference bits. These algorithms rely on the bits
content in the file, and in case one single bit is altered, unique hash value will be changed
totally. This is useful to prove that the image file is an exact duplication of the original hard
disk which makes it valid to be used for forensic purposes. However, there is the possibility
that the hard disk data will be tampered by the authorized parties before imaging process is
done. Therefore, the process of disk imaging should be supervised and documented by
authorized parties in order to reduce this possibility. Another method is to use bootable
operating system CD/DVD to perform disk imaging because it prevents data inside the hard
disk from being modified or deleted.
4. Test Preparations
There are several things that have been prepared before conducting the actual test. First, the
test system is prepared which is a personal computer (AMD XP Athlon 1800+ 1.53GHz,
1.00GB of RAM, SUSE Linux Enterprise Server 10 Service Pack 2). Second, the tools are
installed and configured properly to ensure they will run as smooth as possible. Third, the
source is prepared which is a 20GB partition of hard disk (IDE/NTFS). Fourth, the
destination is prepared which is an external hard disk of 120GB (USB to SATA/NTFS). And
lastly, shell script is created for each tool to allow automated test with several other
commands are timed to run simultaneously during the imaging process. To be accurate, all
the caches will be cleared when the shell script loads. This method ensures that no data from
previous test are left inside the cache which may compromises the test results.
5. Results Analysis
Basically, there are two main variables measured in this research; the imaging rate and the
completion time. Each tool is executed twice, with default mode where no additional options
are used, and with applicable forensic options used. The comparison is done between the
modes used within the tool. The imaging process performance is mostly dependent on the
type of data transfer medium such as (IDE or SATA) and the speed of the hard disk (rpm). In
this case, the imaging process performance is limited because it is being determined by the
limitation of USB data transfer medium ragardless how fast the input and output rate.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 357
5.1. dd imager
dd imager is a native imaging tool originally built for UNIX/LINUX system. This tool is used
to perform imaging on hard drive or partition mounted in the system. It is recognized as the
source of most disk imaging tools created nowadays. The good thing about this tool is no
installation is required as it is pre-installed in most of Linux OS and the bad thing is it only
allows clean imaging without preserving the confidentiality and integrity of the image file for
digital forensic purpose.
Table 1: Comparison between default and speed mode for dd imager
Default Mode Speed Mode
Source Size 20GB 20GB
Block Size 512 Bytes 4096 Bytes
Total Block 40965687 5120710
Completion Time 4482 seconds 942 seconds
Average Imaging Rate 4.7 MB/s 22.3 MB/s
As shown in Table 1, the completion time is reduced significantly and average imaging rate is
increased greatly by approximately 80% when the block size is increased. This is because on
every cycle, the number of blocks processed is fixed regardless how many bytes each of it
holds. The reason why block size is set to be 4KB is because it has been tested and proven to
be the minimum block size needed to get optimum average imaging rate. This means that if
the block size is set to be 32KB, the average imaging rate will not be increased anymore.
5.2. dcfldd
dcfldd is an enhanced version of dd imager for Linux system which is developed by U.S.
Department of Defense Computer Forensics Lab. This imager works like dd with few
additional features added to satisfy digital forensic standards. Significant features added
include hashing on-the-fly whereby hashing is applied during data transfer, new user
interface with progress bar, flexible disk wipes in which the disk content can be cleared
quickly, image verification, simultaneous output, split output into multiple files, and piped
logs and data into external application (Laverdire et al., 2009). The limitation of this
program is that it can only produce raw image file without metadata (details of a file or
folder) attached to it.
Table 2: Comparison between default and forensic mode for dcfldd
Default Mode Forensic Mode
Source Size 20GB 20GB
Block Size 32768 Bytes 32768 Bytes
Total Block 640000 640000
Completion Time 954 seconds 1575 seconds
Average Imaging Rate 22.0 MB/s 13.3 MB/s
Hashing No SHA1 and MD5
Logs No Yes
Table 2 shows the difference between default and forensic mode for dcfldd. There is 60%
reduction of performance between both modes. This is because on-fly-hashing requires each
block to be hashed by both algorithms (SHA1 and MD5) during the imaging process. This
process consumes imaging time, thus, reducing the imaging rate. Logs such as error logs is
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 358
generated at the end of imaging process, indicating the status of the whole process, and errors
if exist, also hash logs are generated to store the calculated hash values.
5.3. dd_rescue
dd_rescue is another enhanced version of dd imager, it does what dd does. The difference is
the ability to continue the imaging process even if read errors occur, unless the maximum
error number is specified. Another significant difference it the imaging process can be started
forward or backward and enhanced user interface. Also, two block sizes are used which is
large (soft) block size and small (hard) block size. When error occurs, it will switch to small
block size to try to read the block with error and will be switched back to large block size
automatically.
Table 3: Comparison between default and forensic mode for dd_rescue
Default Mode Forensic Mode
Source Size 20GB 20GB
Block Size (large) 65536 Bytes 65536 Bytes
Block Size (small) 512 Bytes 512 Bytes
Completion Time 1004 seconds 1051 seconds
Average Imaging Rate 20.4 MB/s 19.5 MB/s
Hashing No No
Logs No Yes
Table 3 shows slight decrease in performance between default mode and forensic mode. This
is because in order to generate logs, the blocks being transferred need to be checked for
errors. This will consume a little time compared to default mode. Since this tool does not
have hashing, the imaging time and rate is almost similar with the other tools default mode
result.
5.4. GNU ddrescue
GNU ddrescue is an enhanced version of dd_rescue which copies data from source to another
just like other disk imaging tools. The most significant feature of GNU ddrescue is the ability
to pause and resume the imaging process without changing the structure of the image file
(Rankin, 2009). Another feature of GNU ddrescue is the ability to rescue as much data that
couldnt be read normally (read errors). Normally, read errors are caused by physical defect
on the disk, if the data can be retrieved and stored to some other places, the error will most
likely to be eliminated. GNU ddrescue normally does not truncate the output file; it will try to
fill in the gaps when running on the same output file. Because of the nature that reads and
writes data at random places, it only works on random access input and output file, and can
use direct access to read the input file. GNU ddrescue is also an open-source tool developed
under GNU General Public License (GPL) project.
Table 4: Comparison between default and forensic mode for GNU ddrescue
Default Mode Forensic Mode
Source Size 20GB 20GB
Block Size 512 Bytes 512 Bytes
Copy Block Size 128 blocks 128 blocks
Total Block Size 65536 Bytes 65536 Bytes
Completion Time 1034 seconds 1036 seconds
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 359
Average Imaging Rate 20.3 MB/s 20.2 MB/s
Hashing No No
Logs No Yes
Table 4 shows no reduction of performance between two modes because no other options of
GNU ddrescue can be used for forensic mode except process logs. And normally, generating
logs will consume only very little resource or affect the imaging process.
5.5. aimage
aimage (advanced imager) is a disk imaging tool which is part of Advanced Forensic Format
(AFF). AFF is a new file format which is almost similar with EnCase file format whereby it
stores the disk image as a series of pages or segments. It also allows the image to be
compressed optionally and allows metadata to be stored within the disk image or separately.
Besides that, AFF has the ability image any file size into single disk image or split disk
images (Garfinkel et al., 2006). Corrupted disk image can also be recovered using specifically
designed internal consistency checker. AFF system has its own set of library which is called
AFFLIB which implements a simple abstraction that makes the AFF image file appear as a
persistent name/value database and as a standard file that can be opened, read, and seeked
with library calls. AFF system is distributed with a set of tools which consists of a disk
imaging program called aimage, an AFF metadata to XML converter program (afxml), a raw
images to AFF images and back converter (afconvert) (Garfinkel, 2006).
Table 5: Comparison between default and forensic mode for aimage
Default Mode Forensic Mode
Source Size 20GB 20GB
Block Size 32768 Bytes 32768 Bytes
Completion Time 1291 seconds 2214 seconds
Average Imaging Rate 16.6 MB/s 9.5 MB/s
Hashing No SHA1, SHA256 and MD5
Logs No Yes
Verification No Yes
Metadata Preservation Yes Yes
Compression No Yes
Table 5 shows reduction of performance by 58% between default mode and forensic mode.
This is due to the implementation of hashing algorithms during the imaging process,
verification after all blocks are imaged, and auto compression mechanism which will
compress the image file automatically to increase the write process speed.
5.6. Overall Comparison
Table 6: Comparison between forensic modes for all tools
dd dcfldd
GNU
ddrescue
dd_rescue aimage
Source Size
(GB)
20 20 20 20 20
Block Size
4096 32768 65536 65536 32768
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 360
(Byte)
Completion
Time
(seconds)
942 1575 1036 1051 2214
Average
Imaging Rate
(MB/s)
22.3 13.3 20.2 19.5 9.5
Hashing No
SHA1 and MD5
Other: SHA256,
SHA384 and
SHA512
No No
SHA1,
SHA256 and
MD5
Logs No Yes Yes Yes Yes
Metadata
Preservation
No No No No Yes
Compression No No No No Yes
Verification No Yes No No Yes
Table 6 shows summary of comparison between forensic modes of all tools. dd imager has
the lowest completion time and highest imaging rate while aimage has the highest completion
time and lowest imaging rate. However, in terms of digital forensic usage, aimage is the most
suitable tool since it has additional capabilities such as hashing, logs generation, metadata
preservation, compression, and verification. On the other hand, dcfldd is also suitable but not
the best for digital forensic usage because it also has hashing, logs generation, and
verification capability.
5.7. Summary of Imaging Speed of All Tools
Figure 1: Column chart of overall imaging speed for all tools
As shown in Figure 1, the most fastest imaging tool is dd and dcfldd (almost as fast). But the
reason behind the speed is because no additional computations such as hashing, compression,
metadata preservation, and logs generation are performed during or after imaging process.
Both tools are suitable to be used for normal imaging as they provide accuracy and speed. For
digital forensic purpose, speed is not as important as the integrity and confidentiality of the
image file. In order to preserve integrity, few computations such as hashing, verification, and
0
5
10
15
20
25
S
p
e
e
d
(
M
B
/
s
)
Default Mode
Forensic / Speed
Mode
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 361
logs generation are required. This is why aimage (forensic mode) has the least speed
compared to all other tools. dd (default mode) is neglected because it doesnt have
implementation of digital forensic features and not suitable to be compared with aimage
(forensic mode).
6. Conclusion
All tests results may vary depending on the specifications of a particular system being used.
However, the analysis results may be almost similar in terms of the reduction of performance
between default mode and forensic mode. Surely speed is the main thing, but in digital
forensic, the integrity and confidentiality of the evidence acquired is the most important thing
besides speed. Based on the analysis, aimage is the best open-source disk imaging tool for
collecting digital evidence while preserving the integrity and confidentiality. Its weakness is
it doesnt provide a graphical user interface (GUI) to ease the user or investigator in
performing the imaging process, similar to other open source tools. Another weakness is not
all analysis tools support its file format (.aff) because it is quite new and the architecture is
different than .dd or .raw file format.
References
Carrier, B. D. (2006). Risks of Live Digital Forensic Analysis. Communications of the ACM,
49(2), 56-61.
Garfinkel, S. L. (2006). AFF: A New Format for Storing Hard Drive Images.
Communications of the ACM, 49(2), 85-87.
Garfinkel, S. L. et al. (2006). Advanced Forensic Format: An Open, Extensible Format for
Disk Imaging. Advances in Digital Forensics II: FIP International Conference on
Digital Forensics, National Center for Forensic Science, Orlando, FL.
Hibler, M. et al. (2003). Fast, scalable disk imaging with frisbee. USENIX Annual Technical
Conference, San Antonio, TX.
Laverdire, M. et al. (2009). Ftklipse-Design and Implementation of an Extendable Computer
Forensics Environment: Specification Design Document. Arxiv preprint
arXiv:0906.2447.
Li, X., and Seberry, J. (2003). Forensic Computing. INDOCRYPT 2003: 4th International
Conference on Cryptology, ND, India.
Palmer, A. T. N. (2004). Computer Forensics: The Six Steps, Retrieved February 15, 2010
from World Wide Web:
http://www.krollontrack.co.uk/publications/UK%20EE%20Newsletter
%20I1%20V3%20AP%20CF.pdf
Rankin, K. (2009). Hack and /: when disaster strikes: hard drive crashes. Linux Journal,
2009(179), 12.
Saudi, M. M. (2001). An Overview of Disk Imaging Tool in Computer Forensics. SANS
Institute, Retrieved March 10, 2010 from the World Wide Web:
http://www.sans.org/readi
ng_room/whitepapers/incident/an_overview_of_disk_imaging_tool_in_computer_foren
sics_643
Tan, J. (2001). Forensic readiness. CanSecWest Computer Security Conference, Retrieved
March 15, 2010 from the World Wide Web:
http://www.arcert.gov.ar/webs/textos/forensic
_readiness.pdf
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 362
KAJIAN AWAL: PERMAINAN SIMULASI WABAK DEMAM DENGGI
Azmi Ibrahim, Nor Azan bt Hj Mat Zin, Noraidah Sahari @ Ashaari
Fakulti Teknologi dan Sains Maklumat
Universiti Kebangsaan Malaysia
43600 Bangi Selangor
azmi.ibrahim@fst.upsi.edu.my, azan@ftsm.ukm.my, nsa@ftsm.ukm.my
Abstrak
Kajian ini merupakan tinjauan awal mengenai tahap kesedaran pelajar sekolah terhadap
wabak demam denggi dan integrasi permainan simulasi berkomputer. Analisis awal ini
dilakukan di Sekolah Menengah Kebangsaan SMK Perempuan Convent Jalan Peel Kuala
Lumpur. Seramai 54 orang pelajar dari dua kelas tingkatan empat telah dijadikan responden.
Hasil tinjauan ini menunjukkan bahawa kesedaran pelajar terhadap wabak demam denggi
adalah sangat rendah. Hasil dari tinjauan awal ini dicadangkan pembangunan satu permainan
simulasi wabak demam denggi bagi membantu meningkatkan kesedaran pelajar terhadap
wabak demam denggi. Pembangunan permainan simulasi ini menggunakan perisian STELLA
yang boleh menghasilkan satu permainan simulasi dinamik.
Kata kunci: Kesedaran, Permainan simulasi, Sistem dinamik
1. Pengenalan
Kes kematian akibat wabak demam denggi semakin meningkat dari tahun ke tahun
terutamanya di kawasan berpenduduk padat. Walaupun pelbagai kaedah digunakan oleh
pihak berwajib bagi menyedarkan orang ramai tentang bahaya wabak demam denggi, namun
demikian bilangan kes yang direkodkan semakin meningkat secara mendadak. Meningkatkan
kesedaran orang awam dan pelajar sekolah mengenai demam denggi semakin penting pada
masa sekarang. Persoalan ini harus mula ditekankan semasa awal perkembangan kanak-
kanak lagi. Pengenalan isu ini di peringkat persekolahan dilihat semakin perlu dilakukan
sama ada secara langsung atau secara tidak langsung.
Kemajuan dalam bidang teknologi komputer seperti penggunaan permainan atas
talian telah menghasilkan pelbagai kaedah pengajaran dan pembelajaran bagi meningkatkan
kesedaran orang awam mengenai wabak demam denggi. Meningkatkan kesedaran orang
awam terhadap demam denggi adalah sangat perlu dan terpaksa. Ini disebabkan banyak
kaedah yang telah digunakan oleh Kerajaan Malaysia seperti penggunaan media masa seperti
media cetak, elektronik dan television masih gagal meningkatkan kesedaran orang awam
terhadap wabak demam denggi (Kementerian Kesihatan Malaysia, 2009). Kertas kerja ini
membincangkan tinjauan awal mengenai tahap kesedaran pelajar terhadap wabak demam
denggi. Tinjauan awal ini telah dilakukan di Sekolah Menengah Kebangsaan Jalan Peel
Kuala Lumpur. Seramai 54 orang pelajar telah dipilih menjadi responden dalam kajian ini.
Daripada analisis awal yang dilakukan sebilangan besar pelajar mempunyai tahap kesedaran
yang rendah terhadap demam denggi. Hasil tinjauan ini mendorong kepada penyelidik untuk
membangunkan satu model permainan simulasi demam denggi.
2. Masalah Demam Denggi
Kementerian Kesihatan telah melaksanakan Kempen Media Denggi dan Chikungunya mulai
Disember 2008 hingga 24 Januari 2009 dengan kos sebanyak RM 3.6 juta. Kempen tersebut
bertujuan memberi kesedaran dan maklumat pencegahan tentang denggi kepada masyarakat
melalui media massa termasuk televisyen, radio dan suratkhabar (Kementerian Kesihatan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 363
Malaysia, 2009). Data peningkatan kes demam denggi dari tahun ke tahun menunjukkan
bahawa kaedah yang diguna kurang berkesan (Jadual 1).
Jadual 1: Data kes demam denggi
Tahun Jumlah kes
1975 400
1980 369
1985 252
1990 4235
1995 6156
1998 26240
2002 30807
2003 30220
2004 32422
2005 37612
Pertubuhan Kesihatan Sedunia (WHO) mengistiharkan bahawa demam denggi dan demam
denggi berdarah menjadi endemik di Asia. Di Pakistan contohnya, tiada lagi bukti yang
didokumentasikan terhadap kesedaran dan amalan populasi orang dewasa terhadap kaedah
jangkitan, tanda-tanda, rawatan dan pencegahan demam denggi (Ahmad Itrat, et al., 2008).
Kempen maklumat dan pendidikan kesedaran demam denggi terhadap pelajar sekolah
diberikan oleh guru terlatih yang diberikan melalui visual watak kartun (Beena, 2008).
Kesedaran terhadap demam denggi dan kawalan nyamuk hanya berkesan sekiranya ilmu
yang diperoleh diamalkan secara menyeluruh. Ini hanya boleh dilakukan melalui kempen
agresif pendidikan kesihatan melalui pekerja kesihatan dan sekolah di dalam sesuatu
komuniti (Anita Acharya et al, 2005). Di Malaysia, belum ada kajian yang menggunakan
permainan simulasi bagi meningkatkan kesedaran orang awam terhadap demam denggi. Ada
beberapa penyelidik luar yang menjalankan kajian penggunaan permainan simulasi terhadap
demam denggi, namun bilangannya sangat sedikit. Antara penyelidik yang membuat kajian
termasuklah Jeffery dan David (2006). Tujuan utama kajian mereka ialah untuk menunjukkan
keupayaan pelajar berumur 8 tahun menghasilkan permainan simulasi mengenai demam
denggi. Hasil kajian mereka membuktikan bahawa pelajar tersebut memerlukan pengetahuan
dan pembangunan kognitif semasa membina permainan simulasi. Kedua-dua penyelidik ini
juga telah melakukan kajian penggunaan educational board game terhadap populasi pelajar
di Filipina dalam tahun 2005. Tujuan utama kajian yang kedua ini untuk menguji
keberkesanan educational board game bagi meningkatkan pengetahuan, keyakinan sikap
positif dan kesan kendiri bagi pencegahan demam denggi bagi sampel pelajar Filipina. Kajian
yang mereka lakukan kurang menekankan penggunaan faktor rekabentuk instruksional.
Dengan ini penyelidik bercadang untuk melakukan kajian mengenai kesan penggunaan
permainan simulasi bagi kesedaran pelajar terhadap demam denggi dengan menggabungkan
ciri-ciri rekabentuk instruksional yang baik. Penambahbaikan kaedah dan kandungan
permainan simulasi dengan pengabungan rekabentuk instruksional ini akan menjadikan
pengguna lebih mudah memahami dan boleh melakukan perubahan tingkahlaku selepas
menggunakan permainan simulasi tersebut.
3. Penggunaan Simulasi Untuk Perubahan Tingkahlaku
Tennyson dan Jorczak (2008) menyatakan bahawa permainan simulasi menyediakan
keupayaan tinggi sebagai instruksional permainan kerana ia boleh memotivasikan pelajar
untuk mengaplikasikan tingkahlaku yang disimulasi dalam dunia sebenar. Antara permainan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 364
simulasi terkini yang dikaitkan dengan kesedaran pengguna termasuklah FloodSim dan
ElectroCity. FloodSim merupakan satu permainan simulasi dalam talian bagi meningkatkan
kesedaran penduduk United Kingdom mengenai polisi banjir. De Freitas et al (2009)
mendapati bahawa FloodSim hanya meningkatkan kesedaran mengenai banjir pada tahap asas
dimana banjir adalah isu yang komplek dan tiada penyelesaian yang secara terus. ElectroCity
pula dibangunkan bagi meningkatkan kesedaran terutamanya dalam kalangan pelajar
mengenai ilmu asas berkenaan tenaga elektrik. Ianya dibangunkan oleh Kerajaan New
Zealand.
4. Metodologi
4.1 Analisis Awal
Analis awal dilakukan melalui dua kaedah iaitu tinjauan literatur dan soal selidik. Tinjauan
literatur dilakukan dengan mendapat maklumat kajian terkini mengenai penggunaan
permainan simulasi melalui pembacaan jurnal dan prosiding. Soal selidik kesedaran pelajar
terhadap wabak demam denggi telah dijalankan di Sekolah SMK Perempuan Convent Jalan
Peel Kuala Lumpur. Analisis dilakukan terhadap dua kaedah tersebut bagi mendapatkan
output mengenai pernyataan masalah.
4.2 Model
Model permainan simulasi demam denggi dibangun menggunakan perisian STELLA. Data
hujan dah suhu diperlukan bagi membangunkan model tersebut. Data kes demam denggi bagi
Majlis Perbandaran Kajang diperolehi dari Jabatan Kesihatan Negeri Selangor manakala data
taburan suhu dan hujan diperolehi dari Jabatan Meteorologi Malaysia iaitu dari tahun 2006
hingga tahun 2009. Ianya merangkumi keseluruhan Daerah Hulu Langat iaitu Mukim Kajang,
Cheras, Semenyih, Beranang, Hulu Semenyih dan Hulu Langat. Semua data yang diperolehi
diintegrasikan di dalam model yang dibina bagi menghasilkan satu permainan simulasi
mengenai wabak demam denggi.
5. Hasil Kajian
5.1 Kajian Awal
Kajian awal yang dilakukan menunjukkan bahawa tidak banyak pembangunan permainan
simulasi demam denggi dilakukan. Di Malaysia, tiada kajian dilakukan terhadap penggunaan
permainan simulasi wabak demam denggi. Di peringkat antarabangsa pula, kajian yang
dilakukan amat terhad dimana penggunaan rekabentuk instruksional tidak dilakukan secara
mendalam. Analisis awal yang dilakukan pada pelajar sekolah menunjukkan tahap kesedaran
amat rendah terhadap wabak demam denggi. Hasil dari kajian awal ini mendorong penyelidik
untuk membangunkan satu model permainan simulasi wabak demam denggi yang
digabungkan dengan rekabentuk instruksional.
5.2 Rekabentuk Model
Model yang dihasilkan masih dalam proses pembangunan lagi. Ringkasan model yang
dihasilkan seperti dalam Rajah 1.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 365
Rajah 1: Model Simulasi Demam Denggi
Model ini merupakan model sistem dinamik yang mana ianya melibatkan stok, aliran masuk
dan keluar. Setiap entiti ini dihubungkan oleh connector supaya sistem yang dibina boleh
berubah-ubah mengikut masa.
6. Kesimpulan
Data menunjukkan kesedaran terhadap demam denggi masih rendah terutamanya dalam
kalangan pelajar sekolah. Walaupun pihak berwajib giat menjalankan kempen kesedaran
wabak demam denggi, namun demikian kes tersebut semakin meningkat dari tahun ke tahun.
Oleh yang demikian perlu satu teknik yang boleh meningkatkan kesedaran pelajar terhadap
demam denggi. Dengan ini, model permainan simulasi yang dibina mampu menjadi pilihan
alternatif bagi meningkatkan kesedaran orang ramai terutamanya pelajar sekolah terhadap
wabak demam denggi.
Rujukan
Ahmad Itrat et al., (2008). Knowledge, Awareness and Practices Regarding Dengue Fever
among the Adult Population of Dengue Hit Cosmopolitant. PLoS ONE. 3 (7).
Anita Acharya et al., (2005). Awareness about dengue syndrome and related preventive
practice amongst residents of an urban resettlement colony of South Delhi. Journal of
Vector Borne Diseases 42, pp 122-127.
Beena., (2008). The Hindu. Online edition of India National Newspaper.
De Freitas S.,Katerina A., Genaro R. M., Memarizia K., (2009). Societal impact of a serious
game on raising public awareness: the case of Floodsim. Proceedings of the 2009
ACM SIGGRAPH Symposium on Video Game
Jeffery L.L., & David W. C., (2005). The GOOD-BYE TO DENGUE GAME: Debriefing
Study. Journal of Simulation and Game. 36.
Jeffery L.L., & David W. C., (2006). Child Invented Health Education Games: A Case
Study for Dengue Fever. Journal of Simulation and Game. 37(1).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 366
Kementerian Kesihatan Malaysia (2009).
http://www.Myhealth.gov.my/myhealth/story_docs/alerts/kpk/KPK_Minggu_06_200
9.pdf
Tennyson R.D., Jorazak R.L., (2008). A Conceptual Framework for the Empirical Study of
Instructional Games. In: Computer Games and Team and Individual Learning, pp. 3
20. Elsevier
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 367
IMPAK PERISIAN BERASASKAN PENDEKATAN PENCERITAAN ANIMASI
INTERAKTIF TERHADAP PENDIDIKAN SAINS PRASEKOLAH
Robiatul Adawiah Jamaluddin
Kuala Lumpur Infrastructure University College (KLIUC)
Universiti Kebangsaan Malaysia (UKM)
rubijamaluddin@yahoo.com
Halimah Badioze Zaman
Universiti Kebangsaan Malaysia (UKM)
hbz@ftsm.ukm.my
Abstrak
Pembelajaran Berbantukan Komputer (PBK) menjadi satu fenomena yang penting dalam
meningkatkan mutu pendidikan kerana ia membantu mempermudahkan proses pengajaran
dan pembelajaran setiap individu yang menggunakannya. Kajian ini bertujuan membina satu
perisian pendidikan multimedia interaktif dan setelah ia siap dibangunkan, ujian akan
dilakukan untuk mengukur pencapaian dan mengenalpasti faktor keberkesanan setelah kanak-
kanak menggunakan perisian MyScience. Disamping itu, kajian ini juga ingin melihat
perbezaan pencapaian di antara kanak-kanak perempuan dan kanak-kanak lelaki. MyScience
dibangunkan dengan berpandukan pada sukatan Kurikulum Prasekolah Kebangsaan, 2006
dan memfokus pada mata pelajaran Sains bertema Meneroka Angkasa untuk peringkat
prasekolah sahaja. Pendekatan yang digunakan ialah cerita animasi interaktif gabungan 2D
dan 3D. Bagi memastikan kesahihan hasil kajian, proses kajian yang dilakukan turut merujuk
kepada teori-teori pembelajaran seperti teori pembelajaran behaviourisme, kognitivisme,
konstruktivisme dan scaffolding. Analisis awal telah dilakukan kepada sepuluh buah
prasekolah di bawah pengurusan Kementerian Pelajaran Malaysia daerah Hulu Langat, untuk
mengenalpasti masalah yang berlaku. Hasil analisis mendapati pengajaran Sains sedia ada
masih berpusatkan guru. Tema Meneroka Angkasa dipilih setelah analisis awal
menunjukkan tema ini adalah yang paling sukar untuk dikendalikan oleh guru prasekolah
berbanding tema-tema yang lain. Kajian ini akan menggunakan kaedah penyelidikan
eksperimen iaitu perlu ada kumpulan kawalan dan kumpulan eksperimen. Model ADDIE
digunakan sebagai landasan, dan kesemua modul di dalamnya memiliki isi kandungan yang
disesuaikan dengan tema Meneroka Angkasa. Modul utama yang terkandung di dalam
perisian MyScience ini ialah modul penceritaan, modul aktiviti dan modul ujian. Agen
pedagogi turut digunakan untuk membantu kanak-kanak mengguna, mengendali dan
meneroka keseluruhan isi kandungan perisian MyScience.
Kata Kunci: Sains, Prasekolah, Multimedia, Interaktif, Cerita Animasi.
1. Pengenalan
Pendidikan prasekolah merujuk kepada Akta Pendidikan 1996 ialah program pendidikan bagi
murid yang berumur dari 4 hingga 6 tahun (MOHE, 2002). Program dan kegiatannya
mengikut garis panduan kurikulum prasekolah yang berlandaskan Falsafah Pendidikan
Kebangsaan, yang diluluskan oleh Menteri di bawah seksyen 22. Tujuan pendidikan
prasekolah ialah untuk memperkembangkan potensi kanak-kanak secara menyeluruh dalam
aspek jasmani, emosi, rohani, intelek dan sosial melalui persekitaran pembelajaran yang
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 368
selamat, menyuburkan serta aktiviti yang menyeronokkan, kreatif dan bermakna. Ini adalah
untuk meningkatkan kemahiran, dan keyakinan diri dengan keadaan semasa, boleh
menangani cabaran dan tanggungjawab di sekolah rendah kelak. (Kurikulum, 2010)
Pada tahun 2002 program Information Communication Technology (ICT) (KPM, 2003)
prasekolah diberikan keutamaan dan dijadikan sebahagian elemen penting. ICT adalah
sebuah sistem yang mengumpul, mengurus, memanipulasi, memperolehi dan
mengkomunikasikan maklumat dalam pelbagai cara. ICT dalam pendidikan adalah
menggunakan teknologi maklumat dan komunikasi untuk mengurus dan mentadbir semua
aktiviti pendidikan, pengajaran dan pembelajaran (P&P) serta untuk pendidikan sepanjang
hayat. Penggunaan ICT dalam P&P membolehkan semua aktiviti dijalankan tanpa had,
meningkat dan membaiki prestasi pelajar dan sumber pendidikan. Maka setiap kelas
prasekolah dibekalkan dua set komputer dan satu pencetak. IBM (M) Sdn Bhd turut
membantu menjayakan program ini semenjak tahun 2001.
Sehingga tahun 2004, IBM telah menyumbangkan sebanyak 59 set komputer kepada
Kementerian Pelajaran Malaysia (KPM) di bawah Program ICT Kidsmart Early Learning
(IBM, 1989). Terbaru, Jabatan Pelajaran Negeri Selangor telah menganjurkan Kursus
Penggunaan ICT Dalam Kelas Prasekolah, pada 10 hingga 13 November 2009 (Mohd
Solleh Halim, 2009) yang lalu bertempat di Hotel Brisdale, Kuala Lumpur. Tujuannya adalah
untuk mengalakkan guru prasekolah menggunakan perisian-perisian seperti Microsoft Word,
Publisher, Excel dan Power Point untuk membina alat bantu mengajar (ABM) dan
mengaplikasikannya dalam kelas prasekolah supaya P&P lebih berkesan dan murid
prasekolah akan lebih berminat mempelajari sesuatu di dalam kelas.
ABM yang memiliki elemen animasi dapat meningkatkan fokus pelajar terhadap sesuatu
topik. Animasi adalah gabungan idea yang dibangunkan melalui teknologi multimedia 2D
dan 3D, bersifat hidup dan mempesonakan, kerana itulah ia diaplikasikan dalam industri
perfileman dan pengiklanan, malah teknologi pendidikan juga. Filem dan siri animasi bukan
hanya disukai oleh kanak-kanak, golongan remaja dan dewasa juga gemar menonton cerita
sebegini untuk berhibur dan bersantai. Oleh itu, saluran 611(Astro Ceria) sebagai contoh,
menjadi pilihan penggemar watak-watak kartun dan animasi seperti Saladin, Upin & Ipin,
Keluang Man, Usop Sontorian, Budak Lapok, Kampong Boy dan Putih, yang
diilhamkan oleh beberapa orang kartunis dan pakar animasi tempatan. Kementerian Sains,
Teknologi dan Inovasi turut menyokong dan meluluskan dana sebanyak RM2 juta pada tahun
2008 bagi membiayai projek dalam industri animasi dan kandungan kreatif digital (PPD,
2010).
Aplikasi atau perisian animasi yang memiliki ciri-ciri cerita interaktif yang dibina untuk P&P
mempunyai faedah yang amat besar, terutama untuk topik yang kompleks dan sukar
difahami. Ciri interaktiviti seperti imej yang bergerak berupaya meningkatkan kefahaman
dan minat kanak-kanak terhadap sesuatu topik dan secara tidak langsung meningkatkan daya
kreativiti mereka. Bahagian Teknologi Pendidikan (BTP) KPM telah menerbitkan perisian
kursus multimedia interaktif sejak tahun 1977. Semua perisian yang dibangunkan adalah
bersifat recourse based berdasarkan kurikulum dan bertujuan membantu pelajar.
Dari segi pembangunan perisian kursus pendidikan, iaitu pembangunan dalaman oleh (BTP),
telah menghasilkan 48 judul dalam tahun 2005. Bagi perisian kursus pendidikan untuk
sekolah bestari, sebanyak 266 judul, telah dibangunkan (BTP, 2006) yang meliputi empat
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 369
matapelajaran iaitu Bahasa Melayu, Bahasa Inggeris, Matematik, Sains, Pendidikan Islam
dan Sains Kemasyarakatan. Di antara perisian multimedia interaktif yang khusus
dibangunkan untuk prasekolah ialah Didi And Doo (2004), Mengenal Huruf Jawi (2004),
Menguasai Abjad (2006), dan Program Anakku Pintar (2006). Manakala perisian multimedia
interaktif yang diterbitkan khas untuk subjek Sains pula adalah Riang Gembira Bersama
Haiwan (2004), Alam Dasar Laut (2004) dan Cuaca (2006).
2. Kajian Literatur
Multimedia secara umumnya didefinisikan sebagai proses komunikasi interaktif
menggunakan teknologi komputer yang menggabungkan pelbagai jenis media digital seperti
teks, audio, grafik, animasi dan video untuk menyampai dan menyebarkan maklumat. Ciri
istimewa yang dimilikinya seperti interaktiviti, navigasi, hiperpaut menjadikan perisian
multimedia mudah difahami dan digunakan. Terdapat beberapa definisi istilah multimedia,
antaranya Kesepaduan di antara pelbagai media seperti teks, numerik, grafik, imej, video,
animasi, dan suara dalam suatu persekitaran digital, di samping mempunyai keupayaan
interaktiviti bagi membolehkan pengguna mencapai maklumat keperluannya tanpa mengikut
urutan. (Halimah, 1996). Multimedia sangat berfaedah untuk P&P dalam semua peringkat
pendidikan. Kajian mendapati bahawa seseorang dapat menyimpan hanya (Thalheimer, 2006)
20% daripada apa yang mereka lihat, 30% mendengar, 50% melihat dan mendengar, dan 80%
serentak apa yang mereka lihat, dengar dan buat. Ini adalah kerana multimedia menggunakan
media-media yang dapat dilihat, didengar dan berinteraksi.
Ciri interaktif yang dimiliki oleh multimedia membenarkan pengguna berinteraksi dengan
media yang disampaikan secara aktif. Pengguna boleh mengawal apa yang dilihat dan
didengar serta boleh menentukan hala tuju masing-masing semasa berinteraksi. Interaktif
media biasanya merujuk kepada produk dan perkhidmatan yang berasaskan sistem komputer
digital yang memberi tindakbalas kepada aksi pengguna dengan mempersembahkan
kandungan seperti teks, grafik, animasi, video, audio dan sebagainya. Ciri yang wajib ada
ialah pengguna dan mesin, kedua-duanya memiliki lebih atau kurang peranan. Kebanyakan
sistem komputer interaktif adalah untuk kegunaan manusia dan berinteraksi dengan manusia
dalam konteks kemanusiaan. Apa jua bentuk antaramuka yang membolehkan pengguna
berinteraksi adalah interaktif. Media interaktif bukan hanya media elektronik atau media
digital. Board games, pop-up books, gamebooks, dan flip books adalah juga antara
contoh media interaktif. Buku yang mempunyai jadual isi kandungan yang ringkas atau
berindeks juga dianggap interaktif kerana pembaca boleh memilih tajuk dengan mengklik
tanpa mengikut turutan atau non-linear.
Buku cerita telah digunakan semenjak dahulu kala lagi oleh semua generasi. Selain itu cerita
juga disampaikan secara bercerita iaitu salah satu kaedah bagaimana manusia berkomunikasi.
Cerita membolehkan manusia berkongsi pengalaman hidup, tidak mengira sama ada cerita
benar ataupun fantasi. Cerita di dalam buku biasanya berstruktur tetap dan tersusun. Tetapi
jika cerita itu disampaikan oleh seorang pencerita, susunan cerita boleh ditukar dan
disesuaikan apabila menerima reaksi daripada pendengar. Ketika mendengar cerita,
pendengar, khasnya kanak-kanak akan berimaginasi dan ada kalanya turut meletakkan diri
mereka sebagai karektor di dalam cerita tersebut. Pengaruh cerita biasanya terbawa-bawa di
dalam permainan harian, di mana kanak-kanak membayangkan diri mereka sebagai karektor
di dalam cerita yang mereka dengar.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 370
Cerita animasi interaktif adalah mewakili versi digital akan perlakuan tersebut. Cerita
interaktif menukarkan bentuk dialog verbal kepada dialog digital. Cerita baru digubah semula
dalam bentuk perbincangan dan menggunakan dialog sebagai kaedah interaksi. Gabungan
teknologi baru dan lama membolehkan manusia, khasnya kanak-kanak mempunyai peranan
di dalam cerita. Teknologi informasi memaksimumkan paras interaktiviti, jalinan rangkaian
dan menukar persepsi pengguna. Cerita interaktif juga membolehkan individu berkongsi
kepandaian dan kepakaran mereka untuk mencipta produk yang lebih kreatif.
Cerita interaktif pada masa ini boleh dikategorikan kepada dua jenis iaitu, yang pertama ialah
cerita interaktif yang menyerupai hiburan lama. Kategori yang pertama, pengguna
mengumpul dan menggunakan pelbagai jenis media untuk mengubah satu atau lebih turutan
cerita bergambar atau berbunyi. Media-media digunakan sebagai alat sokongan kepada
penulis cerita yang mengarang cerita tersebut. Bentuk cerita interaktif seperti ini
menyediakan ruangan antaramuka kolaboratif di antara penulis cerita dan pembaca. Keadaan
sebegini, membolehkan penulis atau pengarang cerita mengubah dan menyebarkan cerita
tanpa had. Contoh kategori ini ialah Moblog, Blogspot, Wordpress dan banyak lagi.
Antaramuka kolaboratif yang disediakan membolehkan penulis cerita melampirkan sumber-
sumber multimedia (teks, foto, bunyi dan video-video kecil) yang dikumpulkan daripada
rakaman aktiviti harian dengan menggunakan alat telekomunikasi moden seperti telefon
bimbit, ipod, kamera digital dan lain-lain.
Kategori cerita interaktif yang kedua ialah aplikasi cerita interaktif yang membolehkan
pengguna turut serta atau pengguna diberikan peranan di dalam cerita tersebut. Cerita
interaktif ini menggunakan persekitaran atau antaramuka maya atau virtual, dan pengguna
boleh juga berinteraksi dengan pengguna lain yang turut serta ketika itu. Seperti permainan
elektronik, pengguna memiliki kawalan untuk menentukan perjalanan cerita, tetapi
pergerakan pengguna turut juga dikawal oleh faktor-faktor lain. Gabungan multimedia dan
realiti maya banyak dieksploitasikan untuk kegunaan peranti mudah alih yang turut
menggunakan alat sokongan lain seperti peranti input dan output. Kaedah pembangunan
cerita interaktif sebegini boleh memaksimumkan penggunaan deria dan pemikiran pengguna.
Rajah 1: Kerangka Konseptual dan Teoritikal Kajian
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 371
Pembinaan perisian cerita interaktif, khusus untuk P&P juga mestilah turut berlandaskan
teori-teori pembelajaran agar dapat memenuhi keperluan mata pelajaran tersebut dan mudah
diterima pakai oleh pengguna sasaran. Teori-teori pembelajaran yang sering dirujuk adalah
seperti teori behavioris, kognitif, konstruktif, dan teori perkembangan sosial. Teori behavioris
menekankan pengguna harus aktif bukannya hanya menjadi pendengar yang pasif. Oleh itu,
penciptaan perisian multimedia yang baik, mestilah membolehkan pengguna terlibat dengan
aktif, dengan aktiviti-aktiviti yang disediakan. Dengan cara itu, pelajar akan lebih berminat
untuk menyelesaikan tugasan dan lebih bertanggungjawab. Ahli behavioris juga berpendapat,
pengguna akan cepat menguasai kemahiran dan fakta asas apabila dapat memberikan reaksi
yang betul kepada latihan-latihan yang disediakan.
Teori kognitif (Zheng, 2007) pula menekankan aspek persepsi yang merupakan interpretasi
sensasi yang diterima oleh deria manusia. Oleh itu, topik yang terkandung di dalam perisian
mestilah disusun dalam turutan hierarki, agar pengguna mudah berfikir untuk membuat
keputusan dalam memproses sesuatu informasi. Bagi topik-topik yang penting tetapi sukar,
galakan harus diberikan untuk menimbulkan keinginan belajar topik tersebut.
Teori konstruktif (Roussou, 2004) pula menerangkan bagaimana seseorang pengguna
membina maklumat kefahaman tentang sesuatu perkara atau fakta melalui tindakan atau
pengalaman sendiri. Ini jelas dilihat pada perbuatan kanak-kanak menyentuh dan merasa
objek yang berada di persekitaran mereka. Ini bermakna pengetahuan atau maklumat tidak
dapat dipindahkan secara terus kepada kanak-kanak, tetapi mereka membinanya sendiri.
Pembelajaran ini juga berkait dengan pengetahuan atau pengalaman lepas.
Teori perkembangan sosial atau Zon Perkembangan Proksimal (Vygotsky, 1962)
menerangkan bagaimana kanak-kanak mencapai satu tahap yang membolehkan dia
melakukan sesuatu tanpa sebarang bantuan daripada pembantunya. Seterusnya, apakah yang
dapat mereka lakukan bagi terus berinteraksi dengan pembantunya. Lev Vygotsky
mengatakan terdapat dua paras atau tahap perkembangan kognitif iaitu paras yang dicapai
oleh kanak-kanak apabila dia berusaha bersendirian, manakala paras yang lebih tinggi adalah
apabila kanak-kanak berpotensi mencapai sesuatu kebolehan apabila mendapat bimbingan
dari pihak yang lebih berkebolehan.
Cerita animasi interaktif adalah sejenis perisian komputer bercirikan hiburan. Terma ini telah
dicipta oleh Chris Crawford, seorang penyelidik dan pembangun perisian (Crawford, 2004).
Beliau menyatakan bahawa pengalaman cerita interaktif sangat berbeza daripada cerita linear
yang konvensional. Cerita interaktif membenarkan pergerakan tanpa mengikut turutan
dengan pelbagai kemungkinan di dalam dunia yang dramatik. Percubaan awal untuk
memahami cerita interaktif telah dilakukan pada tahun 1970an yang diusahakan oleh Roger
Shank dalam penyelidikan beliau di Universiti Northwestern (Shank, 2007).
Pada awal tahun 1980an, Michael Liebowitx membangunkan cerita interaktif bertajuk
Universe (Lebowitz, 1987). Pada tahun 1986 pula, Brenda Laurel menerbitkan disertasi PHD
beliau yang bertajuk, Toward the Design of a Computer-Based Interactive Fantasy System
(Laurel, 1986) di Universiti Ohio State. Semasa tahun 1990an pula, beberapa projek
penyelidikan dimulakan seperti Oz Project (Bates, 1990) yang diketuai oleh Dr. Joseph Bates
dengan Universiti Carnegie-Mello, Ken Perlin pula mengetuai Improv Project (Perlin, 2005)
di Universtiy New York, dan lain-lain.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 372
Terdapat juga beberapa persidangan yang menyentuh topik ini, seperti Workshop on
Interactive Fiction & Synthetic, 1990; Interactive Story Systems: Plot & Character, 1995
(Stern, 2008), Lifelike Computer Characters, Snowbird, 1996 (Graf, 1996), First
International Conference on Autonomous Agents at Marina del Rey, CA., 1997 (Johnson,
1997) dan banyak lagi. Dan yang terkini, persidangan Technologies for Interactive Digital
Storytelling and Entertainment (TIDSE, 2006) yang diadakan di Darmstadt, Germany, telah
menghasilkan banyak kerja dalam bidang cerita interaktif dan digital dan topik-topik yang
berkaitan.
Perisian cerita interaktif yang pertama telah diterbitkan ialah Faade, yang dicipta oleh
Michael Mateas dan Andrew Stern (Gordon, 2003), yang dikeluarkan dalam tahun 2006.
Cerita amat penting kepada budaya manusia. Kita menggunakan cerita untuk menghiburkan
diri, keluarga dan rakan-rakan, untuk menceritakan tentang sejarah, budaya, dan sebagainya.
Melalui cerita juga, kita dapat mengetahui bagaimana dunia terjadi, rupa dan lokasi, malahan
kita juga dapat mengenali tempat tinggal kita, dan bagaimana untuk menjalani kehidupan di
sesuatu kawasan. Penggunaan multimedia dalam pendidikan dikelaskan kepada dua bahagian
iaitu penerokaan dan konstruktif.
Kebanyakan perisian multimedia masa kini menggunakan pendekatan penerokaan kerana
pengguna bebas meneroka perisian mengikut minat dan fahaman sendiri. Manakala
pendekatan konstruktif pula membenarkan pengguna terlibat dengan lebih aktif. Pendekatan
ini sangat baik untuk membentuk atau membina pengetahuan mereka sendiri semasa
menyelesaikan sesuatu tugasan atau latihan yang disediakan oleh perisian. Tutorial interaktif
juga adalah di antara pendekatan yang sesuai untuk turut digabungkan bersama pendekatan
penerokaan dan konstruktif, kerana pendekatan ini menyediakan bahan rujukan tambahan
serta boleh digunakan sebagai alat bantu dalam proses pembelajaran. Berdasarkan teori
pendidikan tersebut isi kandungan perisian MyScience akan dibina untuk membimbing
kanak-kanak prasekolah melakukan aktiviti Sains seperti memerhati, mengelas,
menggunakan nombor, berkomunikasi, mengukur, membuat inferens, membuat ramalan dan
menggunakan perhubungan ruang-masa.
Kajian-kajian lepas mendapati orang dewasa beranggapan bahawa Sains adalah satu bidang
ilmu. Guru-guru juga mendakwa bahawa Sains adalah suatu ujikaji yang kompleks, tabung
uji dan fakta abstrak (Bustam, 2002), tetapi bagi kanak-kanak, Sains adalah satu penemuan
dari alam persekitaran di sekeliling mereka. Sains di peringkat prasekolah adalah dunia
sebenar dan pengalaman harian (Bustam, 2002), seperti memerhatikan pokok bergoyang
ditiup angin, mendengar guruh dan petir ketika hujan, matahari memancar di tengahari dan
sebagainya. Di dalam kelas prasekolah dan makmal penyelidikan di universiti pula, Sains
adalah pencarian aktif untuk mendapatkan pengetahuan baru. Aktiviti ini melibatkan
beberapa individu yang bekerjasama membina, menguji dan menilai teori. Minat secara
semulajadi yang terbit daripada diri kanak-kanak akan dijadikan sebagai asas kepada
pembinaan kemahiran saintifik.
Pelajar-pelajar universiti tempatan juga telah banyak melibatkan diri dalam pembinaan dan
kajian pembinaan perisian multimedia interaktif untuk Pembelajaran Berbantukan Komputer
(PBK) bagi subjek atau tema Sains, contohnya Zuliana Mat Taib pada tahun 2004 bertajuk
Mengenal Haiwan, Mohd Ikhasan Sarmidi pada tahun 2002 bertajuk Penerokaan ke Alam
Haiwan, Mohamad Damanhuri Saleh Huddin pada tahun 2002 bertajuk Buah-Buahan dan
Sayur-Sayuran, Shidatunnaim Mahmud pada tahun 2003 bertajuk Mengenal Abjad,
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 373
Norzihana Ariffin pada tahun 2004 The Living Things And Non-living Things, Norhayati
Yusof pada tahun 2003 bertajuk Mengenal Tubuh Saya, dan Nurul Amirah Mohd Razali pada
tahun 2008 bertajuk Konsep Nombor (ePusatSumber, 2010). Hasil penilaian perisian-perisian
tersebut mendapati perisian multimedia interaktif berjaya meningkatkan tumpuan dan prestasi
kanak-kanak terhadap pembelajaran sesuatu topik.
3. Perisian MyScience
Perisian MyScience akan memberi tumpuan kepada pengenalan dan pemahaman kepada 9
jenis planet seperti yang telah dinyatakan sebelum ini. Modul utama perisian ini ialah Modul
Penceritaan. Modul penceritaan adalah merupakan cerita animasi interaktif yang
mengisahkan perjalanan karektor utama iaitu Obby dari satu planet ke planet yang lain.
Navigasi modul ini boleh dikawal dengan menggunakan butang-butang interaktif, serta
dilengkapi dengan suara pencerita, bunyi kesan khas dan muzik latar. Cerita animasi
interaktif boleh meningkatkan daya kognitif kanak-kanak.
Modul Aktiviti pula direkabentuk bagi tujuan menguji ingatan dan kefahaman kanak-kanak,
sama ada mereka dapat mengingati dan mengenalpasti ciri-ciri setiap planet seperti
rupabentuk, warna dan nama-nama planet. Modul aktiviti juga boleh membantu
mengembangkan kebolehan kreativiti dan konstruktiviti kanak-kanak. Bantuan yang
disediakan untuk modul ini ialah butang interaktif, yang mana kanak-kanak boleh
menggunakannya untuk melihat dan menyemak gambar sebenar, sebagai panduan dan
membantu kanak-kanak mengingati semula nama dan rupa bentuk planet yang akan
diwarnakan.
Di dalam Modul Ujian, Obby bertindak sebagai agen pedagogi iaitu membantu dan memberi
reaksi terhadap jawapan yang diberikan kanak-kanak. Setelah kanak-kanak selesai melakukan
setiap aktiviti, jawapan akan dipaparkan, disertai dengan ganjaran, iaitu satu elemen penting
menurut teori behaviorisme, seperti kata-kata semangat, untuk mendorong minat kanak-
kanak terhadap aktiviti yang seterusnya. Setiap penerangan atau arahan dibantu dengan
penggunaan animasi dan suara.
4. Objektif Kajian
Kajian ini bertujuan, membangunkan pakej perisian multimedia pendidikan untuk
memperbaiki pencapaian matapelajaran Sains di kalangan murid prasekolah seperti berikut:
1. Untuk mengukur perisian MyScience dengan pencapaian pelajar.
2. Untuk mengenalpasti faktor keberkesanan MyScience yang paling mempengaruhi
pencapaian pelajar.
3. Untuk menilai perbezaan prestasi di kalangan pelajar sebelum dan selepas menggunakan
perisian MyScience.
5. Metodologi Kajian
Pembinaan perisian MyScience ini merujuk kepada Model ADDIE yang diasaskan oleh
Rosset dan sering menjadi asas kepada model rekabentuk berarahan yang lain contohnya
model Dick and Carey (Rossett, 1987). Model ADDIE terdiri darpada 5 fasa iaitu analisis,
rekabentuk, pembangunan, implementasi dan penilaian.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 374
Populasi kajian ini ialah kanak-kanak prasekolah yang bersekolah di sekolah kebangsaan di
bawah pengurusan KPM. Seramai 20 orang kanak-kanak akan dipilih dari sekolah yang
terpilih di kawasan Hulu Langat. Munir (2001) untuk penyelidikannya bertajuk MEL untuk
peringkat prasekolah juga telah menggunakan sampel kajian seramai 20 orang sahaja (Munir,
2001). Setiap sekolah kebangsaan hanya memiliki sebuah kelas prasekolah dan jumlah
pelajar adalah terhad kepada 25 orang sahaja. Oleh itu kanak-kanak untuk kumpulan
eksperimen yang akan dipilih adalah bersandarkan kepada bantuan dan keputusan guru.
Ujian akan dijalankan di makmal sekolah tersebut.
Instrumen kajian ini juga disesuaikan dengan model ADDIE. Pada fasa penilaian, kaedah dan
instrumen penilaian yang akan digunakan ialah buku latihan, temubual bersama guru, borang
soal selidik, rekod pencapaian pelajar, alat bantuan mengajar (ABM) dan pemerhatian ke atas
pengguna perisian, iaitu kanak-kanak prasekolah. Manakala pada fasa merekabentuk
instrumen yang akan digunakan ialah kajian lepas, senarai semak, merujuk kepada teori-teori
pembelajaran, teknologi masa kini, spesifikasi rekabentuk, pemerhatian ke atas pengguna,
temubual bersama guru, pakar pendidikan, pakar teknologi maklumat dan pakar rekabentuk
pengajaran. Fasa pembangunan pula, instrumen yang akan digunakan ialah carta alir, papan
cerita, senarai semak dan pemerhatian ke atas pengguna. Fasa implementasi akan
menggunakan senarai semak, prototaip perisian dan pemerhatian ke atas pengguna. Dan yang
terakhir sekali iaitu fasa penilaian, instrumen yang akan digunakan ialah soal selidik, senarai
semak, catatan kajian dan buku aktiviti, rakaman video dan audio, serta pemerhatian ke atas
pengguna.
6. Dapatan analisis awal
Hasil analisis awal yang telah dijalankan melalui kaedah tinjauan, temuduga dan pengedaran
borang soal selidik mendapati kesemua guru prasekolah yang ditemui menghadapi kesukaran
untuk menyampaikan pengajaran Sains bertema Meneroka Angkasa. Mereka juga
mendapati kanak-kanak di bawah jagaan mereka sukar untuk memahami konsep saintifik
tema tersebut. Tema Meneroka Angkasa ini terdiri daripada banyak sub topik. Secara
khususnya, masalah pengajaran Sains yang telah dikesan ialah:
1. murid kurang motivasi belajar matapelajaran Sains.
2. pencapaian dalam matapelajaran Sains tidak memberansangkan.
3. murid pasif, kurang kesungguhan dan minat belajar matapelajaran Sains.
4. murid kurang berkeyakinan untuk meneroka matapelajaran Sains bersendirian.
5. mengharapkan guru memberi jawapan, idea dan mencurahkan ilmu.
6. lebih memilih untuk mendiamkan diri ketika matapelajaran ini diajar, tidak memberikan
jawapan apabila disoal atau menyatakan pendapat.
Borang soal selidik telah diedarkan kepada guru prasekolah semasa kunjungan dilakukan
untuk mendapatkan maklumat mengenai prestasi mata pelajaran Sains di kalangan kanak-
kanak di bawah jagaan mereka. Pengisian borang dilakukan secara bersemuka, agar guru
tidak melakukan kesilapan apabila mengisi jawapan. Bentuk soalan yang dibina di dalam
borang soal selidik adalah pelbagai pilihan jawapan (multiple choice) dan soalan terbuka.
Fokus soalan adalah mengenai kebolehan murid prasekolah melakukan 9 proses Sains dan
mengenalpasti tema yang paling sukar untuk diajar oleh guru. Analisis borang soal selidik
untuk mengenalpasti tema paling sukar dan proses Sains paling lemah dilakukan dengan
menggunakan skala Likert.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 375
7. Kesimpulan
Kehadiran teknologi multimedia memberi harapan baru dalam era pendidikan kerana medium
pembelajaran ini mempunyai keupayaan yang tidak boleh diperoleh daripada medium
sebelumnya. Teknologi multimedia adalah salah satu medium pembelajaran baharu yang
boleh digunakan untuk membantu agar proses P&P lebih berkesan. Ini kerana multimedia
menyepadukan pelbagai media: teks, suara, imej, grafik dan animasi. Selain daripada
gabungan itu, satu lagi keistimewaan yang utama ialah kebolehan interaktiviti. Ini dapat
menarik minat pelajar serta menyokong perkembangan kanak-kanak yang masih belajar.
Teknologi pendidikan pada abad ke-21 selari dengan era Teknologi Maklumat dan
Komunikasi (ICT) melihat Sains sebagai satu kemestian dan keperluan untuk pemodenan
masyarakat. Dalam era ini, pelajar perlu memperkukuhkan kemahiran dan memperkayakan
minda dengan pengetahuan supaya menjadi masyarakat yang efektif, berdaya saing dan
mengamalkan nilai-nilai murni. Program Sekolah Bestari (MDeC, 2007) di bawah projek
Koridor Raya Multimedia (Multimedia Super Corridor, MSC) telah melakukan satu anjakan
paradigma dalam pembangunan teknologi pengajaran. Akhir penyelidikan ini diharapkan
boleh membantu mencapai matlamat dan objektif am pendidikan prasekolah dan menjadi
panduan untuk kehidupan sepanjang hayat.
Rujukan
Abdul Rafie, M. (2001, Mei 15). Pelaksanaan Subjek Sains Tahap Satu Sudah Lama Dikaji.
Didapatkan Julai 14, 2001, daripada Utusan Malaysia:
http://members.tripod.com/pendik/pendidik79.htm
Atherton, J. (2009, Februari 10). Learning and Teaching. Didapatkan Februari 10, 2010,
daripada Piaget's developmental theory:
http://www.learningandteaching.info/learning/piaget.htm
Bates, J. (1990). Computational drama in Oz. Boston.
BTP. (2006). Pejabat Pengarah Bahagian Teknologi Pendidikan. (K. P. Malaysia, Editor)
Didapatkan Februari 4, 2010, daripada Bahagian Teknologi Pendidikan (BTP):
http://www.moe.edu.my:8080/web/guest/profil/sektor/psp/perkhidmatan
Bustam, K. (2002). Pengajaran Awal Sains Kanak-Kanak - Ransangan Berfikir Secara
Kreatif. Didapatkan dari Konvensyen Pendidikan Pra Sekolah:
http://myschoolnet.ppk.kpm.my/arkib/a_berita/2002/19sept03.htm
Crawford, C. (2004). Chris Crawford on Interactive Storytelling. New Riders.
ePusatSumber. (2010). Koleksi Pusat Sumber. Didapatkan Februari 4, 2010, daripada Fakulti
Pendidikan, UTM: http://www.fp.utm.my/ePusatSumber/
Gordon, A. S. (2003). Experience Management Using Storyline Adaptation Strategies. Proc.
of the First International Conference on Technologies for Interactive Digital
Storytelling and Entertainment. TIDSE.
Graf, H. C. (1996, April). Computer Model of the Human Face. Lifelike Computer
Characters workshop . Snowbird.
Grafinger, D. J. (1988). Basics of Instructional Systems Development. (8803).
Halimah, B. Z. (1996). Multimedia Dalam Pendidikan: Hala tuju, dan Pembudayaan di
Universiti Kebangsaan Malaysia. Seminar Multimedia dalam Pengajaran dan
Pembelajaran .
IBM. (1989). Exploring measurement, time, and money - Level 1.
Ibrahim, S. (1994). Perspektif Sumber Manusia Ke Arah Pencapaian Wawasan 2020. Kuala
Lumpur: Dewan Bahasa dan Pustaka.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 376
Johnson, W. L. (1997). First International Conference on Autonomous Agents.
KPM. (2003). Huraian Kurikulum Prasekolah Kebangsaan. Kementerian Pelajaran Malaysia.
Kurikulum, B. P. (2010). Kurikulum Standard Pra Sekolah Kebangsaan 2010 (KSPK).
Kementerian Pelajaran Malaysia.
Laurel, B. (1986). Toward the Design of a Computer-Based Interactive Fantasy System. (D.
Department, Ed.) Ohio State University.
Lebowitz, M. (1987). Creating Characters in a Story-Telling Universe. The Ninth Annual
Conference of the Cognitive Science Society.
MDeC. (2007). Smart School Overview: A Brief History of Smart School. Didapatkan Jun 22,
2007, daripada http://www.msc.com.my/smartschool/events/ updates.asp
Mohd Solleh Halim, M. S. (2009, November 10-13). Kursus Penggunaan ICT Dalam Kelas
Prasekolah. Didapatkan Februari 4, 2010, daripada http://www.mshalim.com/aktiviti-
guru/kursus-penggunaan-ict-dalam-kelas-prasekolah/
MOHE. (2002). AKTA PENDIDIKAN 1996. (I. L. Services, Ed.) Petaling Jaya, Selangor,
Malaysisa: Golden Books Centre.
Munir. (2001). Pembangunan dan Keberkesanan Pakej Multimedia Dalam Pendidikan Untuk
Memotivasikan Literasi (MEL) Di Kalangan Kanak-Kanak Pra sekolah. Universiti
Kebangsaan Malaysia.
Perlin, K. (2005). Toward Interactive Narrative. International Conference on Virtual
Storytelling, (hlm. 135-147).
PPD. (2010, Februari 4). RM2 Juta Bantu Pereka Animasi. (Hans, Editor) Didapatkan dari
Portal Komuniti Warga Pendidikan Daerah Kerian:
http://www.ppdkerian.edu.my/portal/modules.php?name=News&file=article&sid=725
Rohani, A., Nani, M., & Mohd Sharani, A. Panduan Kurikulum Prasekolah.
Rossett, A. (1987). Training Needs Assessment (Techniques in Training and Performance
Development Series) (ed. 2nd Edition). Educational Technology Pubns.
Roussou, M. (2004). Learning by doing and learning through play: An exploration of
interactivity in virtual environments for children. Computers in Entertainment (CIE). 2
(1).
Shank, R. (2007). Authoring educational multimedia content using learning styles and story
telling principles. International Workshop on Educational Multimedia and Multimedia
Education, (hlm. 93-102).
Stern, M. M. (2008, November). Towards Integrating Plot and Character for Interactive
Drama. AAAI Fall Symposium Series.
Thalheimer, W. (2006, Mei 1). Will at Work Learning. Didapatkan Februari 2010, 4, daripada
People remember 10%, 20%...Oh Really?:
http://www.willatworklearning.com/2006/05/people_remember.html
TIDSE. (2006). 3rd International Conference on Technologies for Interactive Digital
Storytelling and Entertainment.
Vygotsky, L. S. (1962). Thought and Language. Journal of Annals of Dyslexia , 14 (1), 97-
98.
Zheng, S. A. (2007). Surprising creativity: A cognitive framework for interactive exhibits
designed for children. Proc. of the 6th ACM SIGCHI conference on Creativity &
cognition C&C '07.
Zurida, I., Sharifah Norhaidah, S. I., & Maznah, A. (2003). Pendidikan Sains Prasekolah.
PTS Publications & Distributors Sdn Bhd.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 377
REKABENTUK MOTIVASI DI DALAM PERISIAN PERMAINAN
PEMBELAJARAN JAWI BAGI KANAK-KANAK: PENGINTEGRASIAN DI
ANTARA MODEL MOTIVASI BARAT DAN ISLAM
Noor Azli bin Mohamed Masrop
Fakulti Teknologi dan Sains Maklumat
Faculty of Information Science and Technology
Universiti Kebangsaan Malaysia
43600 UKM Bangi Malaysia
noorazli@kuis.edu.my
Nor Azan Mat Zin
Fakulti Teknologi dan Sains Maklumat
Faculty of Information Science and Technology
Universiti Kebangsaan Malaysia
43600 UKM Bangi Malaysia
azan@ftsm.ukm.my
Abdul Halim Tamuri
Fakulti Pendidikan
Universiti Kebangsaan Malaysia
43600 UKM Bangi Malaysia
Abstrak
Motivasi adalah satu pemboleh ubah yang penting dan perlu diambil kira apabila
membangun, mengawasi dan menilai keberkesanan pengajaran di dalam perisian permainan
komputer pembelajaran. Faktor-faktor yang dapat meningkatkan motivasi pelajar mestilah
diambil kira ketika membangunkan perisian-perisian permainan ini. Walaubagaimanapun
model-model motivasi yang sedia ada untuk membina perisian pendidikan adalah lebih
cenderung kepada budaya/penulis barat. Oleh kerana itu kertas kerja ini akan membuat
perbandingan beberapa teori/model motivasi daripada penulis-penulis barat dan penulis timur
(Islam) supaya lebih sesuai untuk digunakan di dalam budaya melayu Islam/Malaysia untuk
diterapkan di dalam pembinaan perisian permainan pembelajaran Jawi yang akan digunakan
oleh kanak-kanak. Daripada perbandingan ini dicadangkan satu model rekabentuk motivasi
bagi perisian pendidikan yang lebih sesuai digunakan di dalam budaya masyarakat timur
(Islam).
Keywords: educational games, motivation, motivational models, Jawi, Islamic motivational
models
1. Pengenalan
Motivasi adalah satu pemboleh ubah yang penting dan perlu diambil kira apabila
membangun, mengawasi dan menilai keberkesanan pengajaran di dalam perisian permainan
komputer pembelajaran (Bixler, 2006). Faktor-faktor yang dapat meningkatkan motivasi
pelajar mestilah diambil kira ketika membangunkan perisian-perisian multimedia ini (Huang,
Diefes-Dux, Imbrie, Daku, & Kallimani, 2004). Walaubagaimanapun model-model motivasi
yang sedia ada adalah lebih cenderung kepada budaya barat. Menurut Bixler (2006) seorang
penulis tidak boleh menolak adanya kesan sikap barat terhadap motivasi. Apabila sesuatu
penulisan banyak menggunakan rujukan-rujukan dari penulis-penulis barat, penulisan
tersebut akan lebih cenderung (biased) untuk membincangkan konstruk motivasi yang lebih
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 378
sesuai dengan budaya barat (Bixler, 2006). Walaubagaimanapun ahli psikologi barat hanya
membincangkan aspek jasmaniah (tubuh badan) dan aspek nafsiah tetapi meninggalkan aspek
rohaniah(2005). Menurut Baharuddin (2005, hlm. 43) Walaupun Psikologi Humanistik dan
Tranpersonal telah mengakui spiritual sebagai sebahagian dari elemen psikologi namun spirit
yang dimaksudkan bukan seperti yang dijelaskan dalam pandangan agama. Spirit yang
dimaksudkan Transpersonal ialah neotik iaitu inti terdalam dari kemanusiaan yang
merupakan sumber makna hidup dan potensi diri dari berbagai kemampuan dan sifat luhur
manusia yang luar biasa yang selama ini diabaikan oleh ahli psikologi. Kelopongan teori-
teori psikologi barat ini jelas terlihat apabila dasar-dasar/teori pembelajaran dan motivasi
yang telah digunakan di dalam Al Quran (lebih 14 abad/1400 yang lalu) dalam pendidikan
kerohanian bagi orang-orang mukmin hanya disedari/ditemui oleh ahli psikologi akan
kesignifikenannya di dalam proses belajar setelah kebelakangan ini, iaitu pada awal-awal
abad ke 20 Masehi ini (Najati, 2001). Sedangkan menurut (Mook Soon Sang, 2009) sebelum
abad ke 16 menurut pandangan barat (terutamanya institusi gereja) kanak-kanak dipandang
sebagai insan yang berdosa, dikuasai syaitan dan perlu dibersihkan dengan menghalaunya
daripada tubuh kanak-kanak melalui istiadat baptis.
Oleh kerana itu kertas kerja ini akan membuat perbandingan beberapa teori/model
motivasi daripada penulis-penulis barat dan kemudianya membincangkannya dari aspek
pandangan penulis timur (Islam) supaya lebih sesuai untuk digunakan di dalam budaya
melayu Islam/Malaysia untuk digunakan di dalam perisian permainan pembelajaran Jawi.
Perbincangan yang seterusnya akan membincangkan mengenai konsep motivasi dan beberapa
teori/model motivasi yang akan digunakan di dalam pembangunan perisian permainan
pendidikan.
2. Definasi Motivasi
Motivasi mempunyai banyak definisi yang menjelaskan bidang ilmu yang sangat luas.
Beberapa buah buku boleh dan telah ditulis mengenai definisi dan aplikasinya di dalam
persekitaran lain pembelajaran dan persekitaran lain (Bixler, 2006). Menurut Ormrod (2006,
hlm. 365) motivation is something that energizes, directs and sustains behavior; its gets
students moving, point them in a particular direction, and keeps them going. Crow dan Crow
(1983) pula menghuraikan motivasi sebagai sesuatu desakan yang menjadikan manusia
mengubah sikap, minat atau kegiatannya. Definisi yang digunakan di dalam kajian ini ialah:
perangsang yang membangkitkan dan mengekalkan keseronokan dan minat seseorang
individu ke arah mencapai sesuatu matlamat tertentu.
3. Jenis-Jenis Motivasi
Terdapat berbagai kategori jenis-jenis motivasi yang telah diberikan oleh ahli-ahli psikologi
yang berlainan. Di antara klasifikasi-klasifikasi tersebut adalah 1)fisiologi dan psikologi;
2)motivasi asas (primary motives) dan motivasi yang dipelajari (learned motives) dan
3)motivasi intrinsik dan motivasi intrinsik (Mook Soon Sang, 2010). Tumpuan kajian ini
memberikan fokus kepada motivasi intrinsik yang sesuai digunakan di dalam pembinaan
perisian permainan pembelajaran.
4. Teori Motivasi Menurut Perspektif Islam
Islam yang telah dibawa oleh Nabi Muhammad SAW lebih 1400 tahun yang lalu telah datang
dengan teori-teori pendidikan (termasuk motivasi) yang komprehensif bersumber Al-Quran
dan As Sunnah (Muhanna, 1990). Menurut Baharuddin (2005) di antara perkara utama yang
membezakan di antara psikologi Islam dan Barat adalah persoalan tentang manusia.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 379
Perbezaan pandangan tentang manusia di kalangan ahli Psikologi Barat sendiri telah
melahirkan berbagai-bagai teori yang berkembang di Barat. Psikologi Islami telah
membangunkan teori dan konsep tentang manusia bersumberkan kitab suci Al Quran yang
menyeluruh meliputi 1)Jasmaniah (tubuh fizikal) 2)Nafsiah (Al-nafsu, al-aql dan al-qalb)
dan 3)Ruhaniah. Manakala Psikologi Barat hanya membincangkan aspek jasmaniah (tubuh
badan) dan aspek nafsiah sahaja dan aspek rohaniah tidak terjangkau di dalam psikologi
Barat. Sebagai contohnya Psikologi Fisiologi dan behaviorisme hanya membincangkan aspek
jasmaniah ; Psikoanalisa Sigmund Freud hanya membincangkan aspek nafsiah ; manakala
teori Humanistik hanya membincangkan aspek Jasmaniah dan Nafsiah sahaja (Baharuddin,
2005). Walaupun Psikologi Humanistik dan Tranpersonal telah mengakui spiritual sebagai
sebahagian dari elemen psikologi namun spirit yang dimaksudkan bukan seperti yang
dijelaskan dalam pandangan agama. Walaubagaimanapun perbincangan lanjut perbezaan ini
adalah di luar lingkup kertas kerja ini. Kertas kerja ini hanya akan membincangkan prinsip-
prinsip motivasi yang digunakan oleh Al Quran di dalam mendidik umat Islam.
Ajaran Islam yang dibawa oleh Nabi Muhammad SAW telah mengandungi teori-teori
pendidikan dan psikologi (termasuk motivasi) yang komprehensif (Muhanna, 1990). Konsep-
konsep motivasi ini telah lama diaplikasikan di dalam pendidikan di dalam dunia Islam dan
para sarjana Islam telah menulis mengenai mengenainya (psikologi manusia dan motivasi)
secara intensif walaupun istilah psikologi tidak wujud pada ketika itu (Haque, 2004).
Menurut Haque (2004) di dalam penulisan-penulisan sarjana Islam istilah nafs (self or soul)
digunakan. Nafs merangkumi topik yang luas iaitu qalb(hati), ruh, aql(intelek/kognitif) dan
irada (kehendak). Sebagai contohnya Al-Ghazali(2007) (1058-1111 masihi, 450-505 hijrah)
telah mengemukakan teori keperluan (fitrah) dan personaliti (Mook Soon Sang, 2009) jauh
lebih awal dari teori yang telah dikemukakan oleh Maslow(1970). Haque (2004) pula telah
menyenaraikan sebahagian tokoh sarjana Islam yang menyumbang di dalam bidang ini iaitu
1) Al Ashath Bin Qais Al-Kindi (801866), 2) Ali Ibn Sahl Rabban At-Tabari (838870), 3)
Abu Zaid Al-Balkhi (850934), 3) Abu Bakr Mohammad Ibn Zakariya Al-Razi (864932), 4)
Abu Nasr Mohammad Ibn Al-Farakh (Al-Farabi) (870950), 5) Abul Hasan Ali Abbas Al-
majusi (D. 995), 6) Ikhwan Al-Safa: The Bretheren of Purity (10th century A.D.), 7) Abu Ali
Ahmad B. Muhammad B. Yakub Ibn Miskawayh (9411030), 8) Abu Ali Al-Husayn B.
Abd Allah Ibn Sina (9801037), 9) Abu Hamid Muhammad Al-Ghazali (10581111), 10)
Abu Bakr Mohammed Bin Yahya Al-Saigh Ibn Bajjah (10951138), 11) Ibn Al-Ayn Zarbi
(D. 1153), 12) Abu Bakar Muhammad Bin Abdul Malik Ibn Tufayl (11101185), 13) Abul
Walid Muhamad Bin Ahmad Ibn Rushd (11261198), 14) Fakhr Al-Din Muhammad Umar
Al Razi (1149/501209) dan 15) Muhyid-Din Muhammad Ibn Ali (Ibn Arabi) (11641240).
Ali Ibn Sahl Rabban At-Tabari sebagai contohnya adalah merupakan pelopor dalam bidang
perkembangan kanak-kanak menerusi bukunya Firdaus Al Hikmah. Abu Zaid al-Balkhi pula
merupakan ahli psikologi kognitif dan perubatan yang pertama yang telah berjaya
membezakan dengan jelas di antara neuroses dan psychoses (Haque, 2004). Ahli psikologi
Muslim yang terkini juga telah membincangkan mengenai teori-teori motivasi menurut
perspektif Islam. Bahagian seterusnya akan membincangkan dengan lebih lajut teori-teori
yang dikemukan oleh penyelidik-penyelidik Islam kini seperti Najati (2001, 2006), (Alizi &
Mohamad Zaki (2005), Alawneh (1999) dan Zaleha & Hassoubah (2008)
4.1 Najati (2001, 2006)- Motivasi dalam Al Quran dan hadith Nabi
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 380
Najati (2001) telah mengemukakan teori motivasi berdasarkan kaedah pendidikan yang telah
digunakan oleh Al Quran dan kaedah pendidikan yang digunakan oleh Nabi Muhammad
S.A.W (Najati, 2006). Najati telah membincangkan teori motivasi di dalam Al Quran dalam
bentuk 1)motivasi fisiologi seperti motivasi menjaga kelangsungan hidup dan motivasi
menjaga keturunan, 2)Motivasi kejiwaan/spritual seperti motivasi kejiwaan, motivasi spritual,
3) Motivasi tidak sedar 4)konflik di antara motivasi-motivasi 5)kaedah untuk mengawal
motivasi dan 6)penyimpangan motivasi-motivasi. Najati (2001) juga telah membincangkan
di antara kaedah yang digunakan di dalam Al-Quran adalah untuk menimbulkan motivasi
pembelajaran seperti:
i. Menimbulkan Motivasi dengan Memberikan Harapan (targhib) dan Ancaman(tarhib).
Manusia cenderung melakukan perbuatan yang menyeronokkan dan menjauhi
perbuatan yang menyakitkan. Banyak eksperimen yang telah dilakukan oleh ahli
psikologi moden tentang perkara ini. Ayat-ayat targhib di dalam Al-Quran yang
menerangkan tentang kenikmatan syurga akan membangkitkan cita-cita umat Islam
untuk mendapatkan kenikmatan ini dan berpegang teguh pada takwa manakala ayat-
ayat tarhib yang menerangkan tentang siksa neraka akan membuatkan mereka
menjauhi segala perbuatan dosa. Penggunaan kedua-dua kaedah ini secara bersama
adalah lebih berkesan berbanding dengan hanya menggunakan salah satu kaedah
sahaja.
ii. Membangkitkan motivasi dengan kisah-kisah
Melalui cerita Al Quran memberi nasihat dan membimbing serta mendidik manusia
berbagai pelajaran dan hikmah. Menurut Najati (2001) kebiasaannya kisah di dalam
Al Quran dimulai dengan ringkasan cerita diikuti dengan penceritaan kisah secara
mendalam. Contohnya seperti kisah Ashabul Kahfi. Ada juga kisah yang dimulai
dengan menyebut akibat dan tujuan terlebih dahulu sebelum kisah diceritakan.
iii. Memanfaatkan peristiwa-peristiwa penting
Peristiwa-peristiwa dan masalah-masalah merupakan salah satu faktor yang dapat
membangkitkan motivasi. Al Quran telah menceritakan peristiwa-peristiwa penting
yang dilalui oleh umat Islam terdahulu dan penyelesaian masalah yang telah diambil
sebagai panduan kepada umat kini. Kepentingan memanfaatkan peristiwa-peristiwa
penting ini juga boleh dilihat dari sebab-sebab turunnya ayat-ayat Al Quran
(asbabunnuzul). Kebanyakkan ayat Al Quran juga diturunkan bertepatan dengan
peristiwa penting yang berlaku pada ketika itu.
Menurut Najati motivasi adalah merupakan sebahagian daripada prinsip-prinsip pembelajaran
yang telah digunakan di dalam Al Quran dan Rasulullah di dalam mendidik umat Islam.
Penulis merasakan prinsip-prinsip yang selebihnya juga perlu di bincangkan di dalam kertas
kerja ini kerana ia berkait rapat dengan motivasi pembelajaran seseorang. Oleh yang
demikian bahagian yang seterusnya akan membincangkan prinsip-prinsip pembelajaran ini.
4.1.1. Ganjaran (reward)
Najati (2006) juga telah membincangkan mengenai penghargaan/ganjaran (reward) di dalam
pembelajaran pendidikan. Bentuk-bentuk ganjaran yang digunakan oleh Al-Quran dan
Rasulullah tidak hanya berbentuk kebendaan tetapi juga di dalam bentuk abstrak seperi
pujian, penghargaan dan motivasi. Dari segi jangkamasa ganjaran pula, terdapat tiga bentuk
yang digunakan oleh Al Quran dan Rasulullah iaitu 1)pemberian ganjaran secara sertamerta
contohnya Rasulullah SAW telah memerintahkan agar bayaran upah pekerja hendaklah di
bayar sebelum kering peluh pekerja, 2)menangguhkan pemberian ganjaran dalam tempoh
jangka panjang contohnya ganjaran bagi orang yang berbuat kebaikan ialah syurga
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 381
3)pemberian ganjaran tanpa menetapkan batasan masa yang jelas sebagai contohnya malam
lailatur Qadar yang bersamaan dengan ganjaran seribu bulan tidak dinyatakan masanya
dengan jelas. Menurut Najati (2006) perkara ini dapat merangsang motivasi umat Islam
untuk beramal sepanjang bulan Ramadhan terutama sepuluh malam yang terakhir.
4.1.2. Pembahagian waktu belajar
Di antara prinsip-prinsip pembelajara yang digunakan oleh Al Quran ialah pembelajaran
hendaklah di selangi dengan waktu rehat (Najati, 2001, 2006). Perkara ini dapat dilihat
apabila Al Quran sendiri diturunkan dalam tempoh dua puluh tiga tahun. Rasulullah sendiri
mendidik dan memberikan nasihat di dalam selang masa ini bagi mengelakkan para sahabat
berasa jemu atau bosan.
4.1.3. Bertahap didalam mengubah tingkahlaku
Di dalam pendidik bangsa Arab yang sudah terkenal dengan tradisi buruk yang telah
mengakar umbi di dalam masyarakat mereka Rasulullah SAW telah menggunakan kaedah
iaitu 1)kaedah penanaman iaitu menamkan keimanan di dalam diri manusia 2)menggunakan
kaedah bertahap didalam pendidikan contohnya seperti pengharaman arak telah melalui tiga
fasa iaitu larangan menjauhinya, larangan bersolat ketika solat dan larangan secara mutlak.
4.1.4. Pengulangan
Al Quran dan Rasulullah SAW menggunakan prinsip pengulangan ketika mendidik manusia.
Sebagai contohnya Rasulullah akan mengulangkan sehingga tiga kali sehingga para sahabat
benar-benar memahami ajaran yang disampaikan. Menurut Najati (2001) pengulangan kisah-
kisah di dalam Al Quran bukanlah pengulangan secara total melainkan hanya menyebut
beberapa peristiwa pada suatu kisah yang sesuai dengan kandungan surah itu. Apabila
berlaku pengulangan serangkai kisah, biasanya akan dikemukan sesuatu yang baru dan
berlaku perubahan didalam susunan ayat atau perbezaan pada cerita permualaan atau akhiran
sesuai dengan tuntutan ungkapan yang dimaksudkan di dalam kisah tersebut.
4.1.5. Menarik perhatian
Al Quran telah menyentuh akan peri pentingnya memberikan perhatian kepada pendidikan
yang disampaikan. Beberapa kaedah juga telah digunakan Al Quran untuk menarik perhatian
orang yang membacanya sebagai contohnya dengan menggunakan perumpamaan-
perumpamaan, memulakan surah dengan huru-huruf hijaiyah seperti Alif Lam Mim,
penggunaan sumpah di permulaan ayat, susunan kata di dalam Al Quran berbeza dengan
adanya ijaz balaghah serta alunan muzik yang dapat membangkitkan perasaan dan menarik
perhatian.
4.1.6. Berperanan aktif
Ajaran Islam meminta umatnya berperanan aktif dengan mengamalkan sendiri ilmu-ilmu
yang telah dipelajarinya. Terdapat banyak ayat Al Quran yang menjelaskan tentang perlunya
iman yang diiringi dengan amal soleh.
4.2 Alizi & Mohamad Zaki (2005): teori motivasi Islam berteraskan jihad
Alizi & Mohamad Zaki (2005) telah membincangkan mengenai pandangan Islam tentang
konsep-konsep motivasi bermula dengan keperluaan asas yang diperlukan oleh manusia
seperti lapar, kehausan, seks, kuasa, pencapaian, penghargaan, kerohanian/agama, dan
peranan keimanan di dalam motivasi. Beberapa teori-teori motivasi juga telah dinilai
berdasarkan pandangan Islam seperti teori hiraki keperluan Maslow dibandingkan dengan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 382
Maqasid Shar`iyyah. Alizi & Mohamad Zaki telah mengemukakan teori mengemukakan
teori penggunaan prinsip-prinsip motivasi Islami yang berteraskan Jihad (bersungguh-
sungguh di dalam membuat sesuatu) dan mengandungi elemen keimanan dan agama.
4.3 Alawneh (1999): model motivasi takwa
Teori motivasi yang lebih komprehensif telah dikemukan oleh Alawneh (1999). Alawneh
telah mengemukakan motivasi menurut paradigm Islam yang berasaskan kepada kefahaman
manusia tentang tujuan penciptaannya dan kemudiannya di kaitkan dengan konsep-konsep
asas Islam seperti takwa, iman, khalifah dan taubat dan kaitannya dengan jenis-jenis motivasi
yang berlainan. Alawneh juga telah mengemukakan satu model motivasi takwa.
4.4 Zaleha & Hassoubah (2008): model motivasi pembelajaran 4Ms
Zaleha & Hassoubah (2008) pula telah mengemukakan satu model motivasi pembelajaran
4Ms +Triple S = GOALS. Di mana 4M adalah Muhasabah, Muraqabah, Mutabaah,
Mujahadah dan Triple S adalah Smart , Study, dan Strategies.
Bahagian yang seterusnya akan membincangkan mengenai teori-teori motivasi menurut
penulis-penulis barat yang akan diintegrasikan dengan teori motivasi menurut pandangan
penulis Islam seperti yang telah dibincangkan sebelum ini.
5. Teori-Teori Motivasi Menurut Penulis-Penulis Barat
Walaupun terdapat banyak teori-teori motivasi yang telah dikemukan oleh penulis-penulis
dari barat, tetapi kertas kerja ini hanya akan memberikan tumpuan terhadap teori-teori yang
sesuai digunakan di dalam pembinaan perisian permainan pendidikan. Di antara teori-teori
yang akan dibincangkan ialah teori motivasi FLOW, teori ARCS dan teori motivasi Malone.
5.1 Teori motivasi FLOW
Teori ini telah diperkenalkan oleh ahli psikologi yang bernama Csikszentmihalyi(1982). Flow
telah dihuraikan oleh Csikzentmihalyi (1990) sebagai suatu keadaan dimana seseorang
sangat suka terlibat dengan sesuatu aktiviti sehinggakan tidak mengindahkan aktiviti lain.
Pengalaman yang dialami didalam aktiviti yang dijalankan ini sangat menyeronokkan
sehingga seseorang itu sanggup mengeluarkan belanja yang tinggi untuk melakukannya..
Csikszentmihalyi (1996) telah menggariskan beberapa perkara yang perlu ada untuk
menimbulkan pengalaman flow ini iaitu: i)matlamat yang jelas, ii)maklumbalas yang serta
merta, iii)tahap cabaran dan kemahiran yang seimbang dan bersesuaian, iv)Penyerapan aksi
dan kesedaran, v)Distractions are excluded from consciousness, vi)tiada kerisauan tentang
kegagalan, vii)menghilangkan kesedaran kendiri dan viii)aktiviti itu sendiri menjadi ganjaran
kepada pemain/pelajar.
5.2 Teori ARCS
Keller (1988) telah menghasilkan sebuah model motivasi yang yang digelar model ARCS
berasaskan teori Vroom's expectancy-value theory (Bixler, 2006). Menurut Alessi & Trollip
(2001) secara umumnya pandangan-pandangan Keller adalah berkaitan dengan cadangan
supaya perekabentuk berarahan mestilah mahir di dalam rekabentuk motivasi selain strategi
pengajaran dan rekabentuk permainan. Keller telah mengenalpasti empat faktor untuk
meningkatkan motivasi belajar iaitu: menarik perhatian (Attention), relevan (Relevance),
keyakinan dan kepuasan (Satisfaction).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 383
5.3 Teori Motivasi Malone
Malone (1980), Malone & Lepper, (1983) telah cuba mengenalpasti sifat-sifat permainan
komputer yang mengoptimumkan kuasa motivasi dalamannya. Malone (1981) telah
mencadangkan teori motivasi intrinsik (yang datang dari dalam diri seseorang seperti
keseronokan) adalah lebih berguna kepada pembelajaran berbanding motivasi ektrinsik
(seperti markah peperiksaan). Di dalam kajian awalnya Malone (1981) telah mencadangkan
tiga faktor penggalak motivasi intrinsik iaitu cabaran, sifat ingin tahu (curiosity), dan fantasi.
Di dalam kajian yang selanjutnya Malone & Lepper (1987) telah menambah satu faktor lagi
di dalam teori ini iaitu kawalan pelajar (Alessi & Trollip, 2001).
6. Model Motivasi yang dicadangkan
Hasil perbandingan dan mengintegrasikan teori motivasi berdasarkan kaedah pendidikan
yang telah digunakan oleh Al Quran dan Nabi Muhamamad S.A.W sebagai mana yang telah
dikemukan oleh Najati (2001) dan Alizi & Mohamad Zaki (2005), teori Flow, teori ARCS
dan teori motivasi Malone kami mengemukakan satu model motivasi bagi pembangunan
perisian permainan pendidikan seperti Rajah 1.
Rajah 1 : Model Motivasi MyJawiGame yang dicadangkan bagi pembinaan perisian
permainan pendidikan membaca awal jawi. Di adaptasi dari Noor Azli, Nor Azan, & Shamsul
Bahri (2008)
Model ini mengandungi elemen-elemen yang dapat merangsang motivasi iaitu
fantasi, matlamat yang jelas, memenuhi keperluan pelajar, maklum balas positif,
menimbulkan sifat ingin tahu, menarik penumpuan/perhatian pemain, menimbulkan rasa
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 384
boleh mengawal keadaan bag pemain dan menimbulkan keyakinan diri pemain. Elemen-
elemen ini perlu disesuaikan dengan objektif pembelajaran dan jalan cerita(fantasi) yang
digunakan dengan tidak meninggalkan panduan-panduan yang terdapat di dalam teori
rekabentuk berarahan(ID) dan teori pembelajaran. Seterusnya apa yang diperbincangkan tadi
perlulah selari dengan kehendak agama dan norma-norma budaya tempatan.
7. Kesimpulan
Walaupun telah terdapat beberapa model motivasi yang telah digunakan di dalam
pembangunan perisian kursus dan perisian permainan tetapi model-model ini adalah lebih
cenderung kepada pandangan penulis-penulis dari barat. Kelompangan juga telah dilihat di
dalam teori-teori ini, di mana kebanyakkan ahli-ahli psikologi Barat hanya membincangkan
motivasi dalam aspek teori-teori motivasi barat hanya disekitar aspek jasmani, kognitif dan
emosi tetapi meninggalkan aspek rohani.
Kertas kerja ini telah membincangkan beberapa teori motivasi yang telah
dikemukakan oleh penulis Islam dan Barat . Tinjauan literatur yang dilakukan menunjukkan
Islam telah lama mengemukakan teori-teori motivasi di dalam mendidikan umat Islam
walaupun dengan menggunakan istilah yang berlainan.
Kajian ini mencadangkan satu model motivasi yang menggabungkan teori-teori
motivasi yang telah dikemukakan oleh penulis Barat dan Islam sebagai satu alternatif bagi
mengisi kelompangan yang terdapat di dalam teori-teori motivasi barat dan lebih sesuai untuk
digunakan di dalam budaya tempatan. Model motivasi ini dibina bagi tujuan untuk
membangunan perisian permainan pendidikan membaca awal jawi. Bagi kajian lanjutan,
dicadangakan supaya perisian permainan pendidikan yang telah menggunakan model
motivasi ini diuji keberkesanan untuk memotivasikan pelajar di dalam pembelajaran.
Rujukan
Al Ghazali, I. A. M. b. M. (2007). ihya Ulumuddin (A. R. Usmani, Trans.). Bandung:
Penerbit Pustaka.
Alawneh, S. F. (1999). Human motivation: An Islamic perspective. The American Journal of
Islamic Social Sciences, 15(4), 19-39.
Alessi, S. M., & Trollip, S. R. (2001). Multimedia for Learning (3 ed.). USA: Allyn & Bacon.
Alizi, A., & Mohamad Zaki, S. (2005). Psychology Of Motivation From An Islamic
Perspective. Paper presented at the 3rd International Seminar on Learning and
Motivation. from http://iium.academia.edu/AliziAlias/Papers/99172/Psychology-of-
Motivation-from-an-Islamic-Perspective
Baharuddin, M. (2005). Aktualisasi Psikologi Islami (1 ed.). Yogyakarta: Pustaka Pelajar.
Bixler, B. (2006). Motivation and its Relationship to the Design of Educational Games. Paper
presented at the???SummerConf.
Crow, L. D., & Crow, A. (1983). Psikologi Pendidikan untuk perguruan (2 ed.). Kuala
Lumpur: Dewan Bahasa dan Pustaka.
Csikszentmihalyi, M. (1982). Toward a psychology of optimal experience. In L. Wheeler
(Ed.), Review of Personality and Social Psychology. USA: Sage Publications.
Csikszentmihalyi, M. (1990). Flow: The Psychology of Optimal Experience. New York, NY:
Harper Perennial.
Csikszentmihalyi, M. (1996). Creativity: Flow and the Psychology of Discovery and
Invention. New York: HarperCollins Publisher.
Haque, A. (2004). Psychology from Islamic perspective: contributions of early muslim
scholars and challenges to contemporary muslim psychologists. Journal of Religion
and Health, 43(4), 357-377.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 385
Huang, D. W., Diefes-Dux, H., Imbrie, P. K., Daku, B., & Kallimani, J. G. (2004, October 20
23, 2004,). Learning Motivation Evaluation for a Computer-based Instructional
Tutorial Using ARCS Model of Motivational Design. Paper presented at the 34th
ASEE/IEEE Frontiers in Education Conference, Savannah, GA.
Keller, J. M. (Ed.) (1988) Encyclopaedia of Educational Media Communications and
Technology (2 ed.). Westport, CT: Greenwood Press.
Malone, T. W. (1980). What makes things fun to learn? A study of instrinsically motivating
computer games.
Malone, T. W. (1981). Toward a Theory of Intrinsically Motivating Instruction.
Instruction',Cognitive Science: A Multidisciplinary Journal,, 5(4), 333 369.
Malone, T. W., & Lepper, M. R. (1983). Making learning fun: A taxonomy of intrinsic
motivations for learning. In R. E. S. M. J. F. (Eds) (Ed.), Aptitude, learning and
instruction: III. Cognitive and effective process analysis. Hilldale, NJ: Erlbaum.
Maslow, A. H. (1970). Motivation and personality (3 ed.). New York: Longman.
Mook Soon Sang. (2009). Perkembangan Kanak-Kanak. Ipoh: Penerbitan Multimedia Sdn.
Bhd.
Mook Soon Sang. (2010). Psikologi Pendidikan untuk Pengajaran dan Pembelajaran (2 ed.).
Ipoh: Penerbitan Multimedia Sdn. Bhd.
Muhanna, M. I. G. (1990). Determinants of Contemporary Islamic Educational Theory
Design. Paper presented at the Towards the Construction of a Contemporary Islamic
Educational Theory.
Najati, M. U. (2001). Jiwa manusia dalam sorotan Al Quran (I. Ibrahim, Trans.). Jakarta: CV.
Cendekia Sentra Muslim.
Najati, M. U. (2006). Psikologi dalam Tinjauan Hadits Nabi (S. A. Wawan Djunaedi
Soffandi, Trans. 2 ed.). Jakarta: Mustaqim.
Noor Azli, M. M., Nor Azan, M. Z., & Shamsul Bahri, C. W. (2008). Digital Games-Based
Learning for Children. Paper presented at the International Symposium on
Information Technology (ITSIM) 2008. . from
http://ieeexplore.ieee.org/search/freesrchabstract.jsp?tp=&arnumber=4631582&query
Text%3Dnoor+azli%26openedRefinements%3D*%26searchField%3DSearch+All
Ormrod, J. E. (2006). Educational Psychology: Developing Learner (5th ed.). New Jersey:
Pearson Education Inc.
Zaleha, I., & Hassoubah, A. M. (2008). Motivation and student learning Jurnal Pendidikan
Islam, 13(1, Ogos 2008), 81-97.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 386
A TWO-WAY ATTRIBUTE TREE IN P2P OODB SUPPORTING MULTI-
ATTRIBUTE AND RANGE QUERY WITH IMPROVED QUERY RESPONSE TIME
Goh Chiao Wei, Lim Tong Ming
School of Computer Technology
Sunway University College
Bandar Sunway, Malaysia
jaygcw2002@yahoo.com, tongminglim@gmail.com
Abstract
P2P has been one of the most rapid growing technologies in computing world. It has been
introduced to overcome the bottleneck of typical client-server paradigm, in which it has the
limitation of handling the rapid growing demanding of data. Peer-to-peer object-oriented
database is robust, fault-tolerance and scalable. Therefore, it is proposed to overcome the
drawbacks of typical client-server data management architecture. DHT, structured P2P
system, provides indexing facility enables users to locate a piece of data based on a given key
through an efficient routing algorithm. The proposed object-oriented database was built on
the openChord, a Chord implementation. In this paper, we present a P2P object-oriented
database which supports multi-attribute and range queries. The objects are managed locally in
each peer to reduce the network traffic. Object set returned is stored around the nodes along
routing paths to provide efficient access to a desired object in the subsequent queries that
fulfil the query criteria. Nodes holding the object pointers are distributed around the network
to reduce the lookup time. Nodes are organized into logical class hubs where each hub
handles pointers to nodes storing objects belonging to a particular class. Queries involving
multi-attributes and ranges are routed to the related class hubs to retrieve the desired objects.
Keywords: Object-Oriented Database System; P2P System; DHT; Chord
1. Introduction
Peer-to-peer (P2P) networks have been one of the most rapid-growing computing
technologies nowadays (Harren et al.). The introduction of P2P networks overcomes the
limitations founded in conventional client-server network, where the network has a rigid and
highly centralized architecture. The conventional client-server network architecture requires a
centralized server or cluster of servers to store and process data requested from the clients in
the network. Hence, bottleneck might occurred in the servers and thus facing the scalability
problem. This creates the issue of single point of failure where once the server is down or
disconnect, the transactions in the network will fail. Furthermore, setting up a client-server
environment is costly.
Apart from this, the demanding of data for storage and processing purposes have been
growing extensively. The growing for the performance of processor against the growing of
data is not proportional (Vilaca and Oliveira, 2009). The typical client-server systems do not
afford to support this rapid growing demanding of data. Therefore, P2P systems come in
place to overcome such phenomena. P2P comprises clusters of computers working together
in the network to build a cheap and scalable server solution (Bratsberg). Besides, P2P
systems have greater scalability, direct access to the nodes which contain the desired
resources/data without passing through a central server, robust and resilient to the churn.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 387
The first generation of P2P systems is the unstructured P2P. The typical examples of
unstructured P2P system are Gnutella and Napster. However, unstructured P2P system
experienced the poor scaling problem (Harren et al.) and does not guarantee the reachable of
desire data in network because of the data placement and network constructions are
essentially random (Harren et al.). To overcome the limitations introduced by unstructured
P2P, plenty of works on P2P systems have concentrated on structured P2P (Stoica et al.,
2001; Rowstron et al., 2001; Zhao et al., 2004; Ratnasamy et al,. 2001) in recent years. These
structured P2P networks proposed Distributed Hash Table (DHT), where nodes are logically
organized in a structured way and are organized following a predefined pattern, such as ring
(Stoica et al., 2001) for Chord, Cartesian Coordination (Ratnasamy et al,. 2001) for CAN and
etc.
Due to the DHTs excellent properties to manage dynamic systems (Prada et al.), DHT has an
edge over unstructured P2P systems. For instance, DHT promises a logarithm routing hops to
reach the destination node with an explicit load balancing (Bharambe et al., 2004). DHTs
provide an index facility to map the data to the nodes in the network and routing algorithm to
route requests to the correct node holding the data source. In addition to this, DHT also
provides excellent scalability where nodes can join and leave the networks without any
restrictions (Prada et al.). The P2P paradigm has been introduced into the database
community (Sartiani et al.) to solve the problem of client-server architecture as stated above.
P2P paradigm is able to avoid a single point of failure, which in turn increases the reliability
of the system. . In this paper, a preliminary design on the building of an object-oriented
database system on top of the openChord, an implementation of Chord DHT to provide a P2P
object-oriented database system. The combination of database system with the structured P2P
network making the data stored in each node accessible by all the other nodes. The blurring
of the client and server role improve the processing time as nodes can access to other nodes
directly without going through a server.
The objective of this paper is to improve query response time by using attribute search trees
with the Chord DHT to support multi-attribute and range query for the P2P database system.
The rationale behind choosing structured network as the overlay network over unstructured
network because structured network promises the deriving of desired object sets as long as
the objects are available in the network. Besides, as mentioned above, structured network
guarantees requests reaching the destination node in logarithm hops, which greatly reduce the
query response time.
2. Related Works
There were existing works on the building of database management system on structured P2P
network. Yu et al. (2008) proposed a peer-to-peer database model based on Chord. It used
Local Relational Model (LRM) as the database model defined for P2P database system. It
had a node catalog on the application layer on top of the overlay network. It made use of the
Chord to organize the nodes in the network and to locate the data. The keyword information
of a data is put into an appropriate node and thus forming a node catalog. These local nodes
catalogs are group together become a global node catalog. There is a manager peer for each
catalog where each catalog might represent a region. Data transmission between regions is
going through the manager peer. It is somehow similar to the leader in our proposed design
where leader is the peer which in-charge of a particular class in the database.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 388
XPeer (Sartiani et al.) is a XML P2P database system. It manages data spread over an open-
ended network. There is no global schema defined in the database. It is build upon hybrid
P2P where peers may perform some administrative tasks. Peers shared the data in the form of
tree-shaped, called tree-guide. Peers are logically organized in the cluster of nodes where a
super peer is in-charge the management of the cluster of nodes. XPeer uses FLWR subset of
XQuery for the query. Similar to our designed, there is a leader which corresponds to the
super peer in XPeer for the management of a group of logical nodes.
Besides databases, there are also various protocols designed for implementing multi-attribute
and range queries on DHT. Mercury (Bharambe et al., 2004) supports multi-attribute and
range queries by initialize various logical attribute hubs for various attributes schema. A
physical node may involve in multiple attribute hubs. An attribute is responsible for an
attribute in the schema. Each attribute hub forms a ring topology and each node handles a
certain range of numeric values. Multi-attribute query can be executed by traversing the
query to different attribute hubs for different attributes in the query. Range query is also be
done by traversing the query within the attribute hub to the correct node responsible for the
numeric range. This is somehow similar to our proposed design where various attribute trees
handle various attributes.
Ramabhadran et al. proposed an adaptive solution to support range queries in DHT-based
systems. It supports range search based on the range search tree (RST). Values of the
attribute are stored at the leaf node of the RST. Each non-leaf node corresponds to the union
range of its two children. Hence, it is a complete and balanced binary tree with [log n] + 1
levels. RST periodically perform path maintenance protocol to maintain the band information
of the tree for the query purposes. The query is resolved by determines the minimum cover
(MC) of the range in the query by running simple top-down recursive algorithm to find the
first node has the largest range within the query range and recursively repeats this process for
the segments of range which has not been decomposed yet. Once MC is computed, the query
sends to each corresponding MC node in the overlay network. It is similar to our design
where values of the attribute are also stored in the leaf node. Our design is also adaptive to
the changes of the number of objects in the system.
Wang and Li (2009) proposed a range query model to support range query over DHT using
B+ tree. The model proposed by Wang and Li (2009) also support for multi-attribute query. It
selected Chord as the overlay network. In order to support multi-attribute, there will be
several B+ trees in which each tree responsible for an attribute. By using the hash function
provided by Chord, it ensures that nodes in B+ tree are evenly mapped to the nodes in Chord.
The resources of the attributes are registered in the leaf node of B+ tree. For a range query,
the query starts at the root node of the tree. The query is decomposed into several sub-queries
and the sub-query must ensure contained in one child node. The sub-query continues to
decompose until reaching leaf node. In order to support for multi-attribute query, Wang and
Li (2009) adopted store and forward method where the query is execute in the first attribute
until reaching leaf node and the query is forwards to the second attributes and so on.
3. The Proposed System Architecture
The proposed solution improves multi attribute and range query response time for a P2P
persistent object management system on OpenChord P2P platform, an implementation of
Chord.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 389
3.1 Node Structure
Nodes connect to P2P network via Chord overlay network as nodes are logically organized in
ring overlay where every node is connected by a predecessor node and a successor node
(Figure 1). The network module is connected to the Chord network in the proposed design.
Nodes are connected in the overlay network are presented in dotted lines. Every node
contains a finger table, predecessor list and successor list that maintain the logical overlay of
a P2P network. Users connect to the database system through the user interface reside in the
presentation module. It is the bridge between users and the system. It receives instructions
from users and return results to users graphically. Query and Update Manager responsible for
the data query, update data and concurrency control. Caching caches previous object sets and
node information of the Attribute Tree (Section 3.3) to accelerate the query performance.
Local storage is the local database in which it stores all the objects in the local machine.
Export Schema allows the objects in the schema to be shared and modified by other nodes.
Network module is the module acts as a communication bridge between the local node and
the nodes in the network.
Figure 1: Node structure.
3.2 Class Hub
Query search starts from a root class and navigate to the desired user-defined class that
contains the desired objects. The search will drill into the classs attributes and finally goes
into the attributes values to retrieve matched objects which fulfill the constraints of a query.
Hence, in our proposed initial design, nodes are responsible to manage object pointers of a
registered class to a leader.
The object pointers are stored in the nodes in the form of <Node Identifier; OID; Value>.
Each object has a unique OID, which similar to the primary key in relational database. Value
represents the data of the particular attribute in the object in which corresponds to its residing
attribute tree. Object pointers are only stored in the leaf nodes in attribute tree (Section 3.3).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 390
A leader (Figure 3), in the class hub acts as a gateway to pass the query searching for a
particular class into the right attribute trees. Attribute tree is a logical tree used to
accommodate the pointers to the actual object of an attribute (Section 3.3). Basically, a leader
of a class hub contains pointers to all the root nodes of the attribute trees, in which the
attributes are belonging to the class. In the meantime, the leader also replicates its pointers to
few replicas.
Leader of the class hub is being selected based on the hashing of the class name. The class
name is hash to a key, H(Classname). The overlay network looks for the successor node
responsible for the key, successor(H(Classname)) and elects it as the leader. The leader will
also replicate the pointers it is holding to n of its successor node for the backup purposes. It
also helps to reduce the load of the leader to avoid bottleneck by directing the query to the
replicas of the pointers when the load of the leader is heavy.
Thus, when a query comes in, it contacts the leader of the class hub. The leader points the
query to the related attribute trees to execute the searching procedure (Section 3.5). If the
query load of the leader reaches the limit, in which the limit can be defined by users, the
leader will redirect the query to its next replica node, in which is its immediate successor
node. If the successor node also reaches the load limit, the query will be redirected to the next
replica node. The process continues until reaching a replica with light load.
Figure 2: Pseudo code for forwarding query to related attribute tree through leader of class
hub.
Figure 2 is the algorithm of the proposed query forwarding to leader of class hub technique.
Q represents the query passing in. N
i
represents the current node the query is passing in. L
corresponds to the leader of the class hub and RL is the replicas of the leader. LN
i
is the load
/ number of queries passing in to the current node. AN represents the root node of the
corresponds attribute tree.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 391
Figure 3: Depiction of the class hub.
3.3 Attribute Tree
An Attribute Tree corresponds to an attribute in a class. It is a logical tree which
accommodates the pointers of the actual object location (object pointer) for the values of the
attribute. The bound of the values in a tree can be dynamically adapted to the values of the
attribute by the merge and split operations. The details of merge and split operations are
explained in the subsequent paragraph. The attribute tree consists of three types of nodes, the
root, intermediate and leaf nodes. Every node has at most two children nodes except for the
leaf node. Attribute tree is a binary tree that defaulted to 2-way.
The mapping of nodes into a tree is not a one-to-one relation. A physical node in the Chord
might map to various logical node in the same tree or different tree. A node in Chord maps to
the node in tree by hashing the range of values it responsible, which will be explained in
subsequent paragraph (Figure 4). Since Chord uses the consistent hashing algorithm which
ensures an evenly distribution of nodes, hence the mapping of a physical node to the logical
node in a tree has the high probability of evenly distributed as well.
Root node is the first node at the top of a tree. It corresponds to the entire value range of an
attribute. Hence, it covers the full range value of the attribute. It has the information of the
entire tree and aware of the total number of objects pointers for the tree. Intermediate nodes
are the nodes between the root node and the leaf nodes. Intermediate nodes in charge sub-
range of the values, which is the unions of its children nodes.
Range(P
i
)=Range(C
i1
) Range(C
i2
).
P
i
is the intermediate node and C
i1
and C
i2
are the children nodes of P
i
.
Intermediate nodes store the pointers of their children, the information of the sub-trees below
them and the pointer of their parent node (The node with one level higher than them).
Intermediate nodes store the total number of object pointers of the sub-trees. Leaf nodes are
the node at the bottom level of the tree. They are handling the smallest sub-ranges. Besides,
leaf nodes also store the object pointers with the attribute values fallen into their range. They
replicate the object pointers to their n immediate successor nodes in the overlay network.
Each replica has a link to the next replica and hence forms a link list of replicas. Leaf nodes
also store the pointer to their parent node and pointers to the sibling nodes (The leaf nodes
locate on its immediate left and right respectively) for the better range query response time.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 392
Tree nodes are mapped to the Chord nodes based on the hashing of the range values. The
formula to generate the key of the range values is (L+U)/2, L is the lower bound of the range
and U is the upper bound of the range. By using the average point of the range, the key of the
range can be hashed, H((L+U)/2). It is then mapped to the successor node of the key in the
Chord identifier space.
There are basically two operations to carry out by a node; the split and merge operations. The
split happens when the density (Number of object pointers accommodate in the node) of the
leaf node exceed the threshold. The split is performed when
(D
i
/L)100 > 100/L
where D
i
is the density of the node i and L is the total density for the tree.
The merge operation is performed when the density of the two adjacent leaf nodes under the
same parent node below a certain ratio. The merge is performed when
(D
i
/L)100 < 100/2L
However, if the leaf nodes are directly under the root node of the tree without any
intermediate nodes, the split operations are performed based on the other criteria. The split
operations for the leaf nodes are only performed when the density of the node, D
i
exceeds a
constant number, C. The value of C is setup at the root node of the tree by the administrator
during the tree initialization.
Figure 4: Example of Attribute Tree
3.4 Nodes Leaving
It is possible that nodes in a tree leave/disconnect from the network periodically. There are
different recovery procedures for different types of nodes.
If the root node disconnect from the tree, the leader of the class hub contacts the next
immediate successor node of the previous root node in the Chord network. The root node
establishes the connection with the tree by linking to the children nodes below it. The leader
updates its corresponding root node.
If the intermediate node disconnect from the tree, the parent node contacts the next
immediate successor node of the previous intermediate node and make linking to the next
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 393
children nodes. The parent node forwards its sub-tree information to that newly joined
intermediate node.
If the leaf node disconnect from the tree, the parent node links to the immediate successor
node of the previous leaf node, which is also the first replica of the leaf node. The replication
of object pointers is redistributing across the n successor nodes.
Figure 5: Pseudo code for nodes leaving the attribute tree.
Figure 5 above depicts the pseudo code for various kinds of nodes leaving the tree. AN
i+1
represent the immediate successor node of the previous root node. IDENTIFIER(C
AN1
) and
IDENTIFIER(C
AN1
) correspond to the node identifier of both the children nodes for the
previous root node. C
i
represents the children node for the node P
i
. C
i+1
is the immediate
successor node for the disconnect children node. LN
i
is the leaf node for the node P
i
. RLN
i
is
the replica of the leaf node.
3.5 Query
When a node initiates a query, it first checks if any of the object sets cached in its caching
manager subset (Section 3.7) of the query. If there is object set subset of the query, the node
directly retrieves the result from the caching manager. Else the node sends the query over the
network to obtain the desired result.
Before the query is being forwarded to the overlay network, the node determines if it has
cache the location of corresponding node in the attribute tree which has the minimum cover
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 394
to the range in the query. For instance, according to Figure 4, a user wants to search for
attribute a within a class c with the range [2, 30]. The node with the minimum cover to the
range is the node with sub-range [1, 39]. If the node does caches the location of the node,
then it forwards the query directly to the corresponding node and performs the query. This is
to avoid bottleneck occurred in a root node when the query load is heavy and for faster access
to the responsible node for better query response time.
In the other way, if the node does not caches of the nodes identifier, it forwards a probe
request to the leader of the class hub. From the leader, the probe request is sent to the root
node of the attribute tree and the probe request is decomposed into sub-request to its children
node. The process continues until the request encounters the node which responsible to the
range. The probe request is then sending back to the query initiator and cache the identifier of
the node in the caching manager. The actual query is then forwarded to the corresponding
node in the tree and perform search traversed down the tree and finally send the result back to
the query originator upon successful operation. The result is compiled into a list and sends
request to those node that hold the actual objects. The object set is cached into the query
originator and the object set is cached into the nodes along the path of how the query is
traversed too.
While the query traverses down the tree, it checks the local cache manager of the node in the
tree as well to look for the object set cached in the cache manager which is subset of the
query. If there is object set cached in the cache manager, the query terminates and the object
set is sends back to the query originator. The object set is cached in the nodes along the path
of where the query traversed.
There are two types of list attach with the query along traversing the attribute tree, which are
routing path list and object pointers list. Routing path list contains the list of node identifiers
which are part of the traversed path. Routing path list stores node identifiers in the form of
<Node Identifier, Attribute, Value Range>. Once the query reaches a node, the node checks
if whether its own node identifier exists in the routing path. If the identifier is not existed, the
current node identifier is adding into the routing path list. For the object pointers list, it
contains the list of object identifiers which are the answer of the query who match the query
constraints. The object pointers list stores object identifiers in the form of <OID, node
identifier>. If the object pointers list is empty, the OID is inserts into the list. If the list is not
empty and does not contain the current OID, then the current OID is inserts into the list.
3.5.1 Range Query
It is possible to execute a query search for a certain range within attribute tree. We proposed a
lower-upper bound approach to execute range query. When query reaches the node with the
minimum cover to the range, the query is splits into two sub-queries, which corresponding to
the lower bound of the query and upper bound of the query. The lower bound query forwards
the query to its left child node responsible for the smaller sub-range and the upper bound
query forwards the query to its right child node responsible for the larger sub-range. The
process continues until both the lower and upper bound queries reach leaf node. From the
lower bound and upper bound leaf nodes, they send the query towards each other through the
sibling nodes and finally meet each other. The desired result is the union of the lower bound
query and the upper bound query. Figure 6 depicts the searching scenario to search for the
range [5, 50].
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 395
Figure 6: The lower-upper bound approach.
3.5.2 Multi-attribute Query
Our proposed design also supports multi-attribute query. A query is a conjunction of sub-
queries where each sub-queries querying an attribute in the class.
For instance, a SQL-like query SELECT * FROM CAR WHERE door_number = 4 AND
car_color = white is a query with the conjunction of two sub-queries. This query can be
spitted into two sub-queries. This query selects all the instance of cars from the CAR class
with the constraint attribute door_number must be four and car_color must be white. It is
basically the intersection of the sub-queries: SELECT * FROM CAR WHERE door_number =
4 and SELECT * FROM CAR WHERE car_color = white. The intersection of object set
from the first sub-query and the second sub-query would produce the final object set
answering the query.
To achieve multi-attribute query more effectively, we can actually decompose the query into
n sub-queries, in which each sub-query corresponds to a criteria. More precisely, a sub-query
is responsible for one of an attribute, in which the attribute is the constraint in the query. In
POMS, we proposed a store and forward method. The query is starts with the first attribute
tree. Once the sub-query for the first attribute tree has complete the searching, the entire
query associate with the routing path list and object pointers list are forward to the second
attribute tree. From one tree traverse to another tree, the last leaf node checks to determine
whether it caches the node location of the next tree which covers the range of the next
constraint. If it does, the query can forward directly to that node without having starts from
the root node. The process continues until the query completes in the nth attribute tree. At the
end of the searching process, a complete list of routing path list and object pointers list are
compiled. Both the lists and the query are sending back to the query originator in order to
retrieve the complete object set.
Although this method requires longer time to complete, it however reduces the workload in
query originator and also the network traffic required. The compiling result process can be
done in every last leaf node in the tree before forward the query to the next tree. Hence, the
compiling process does not need to be done in the query originator as the query originator
gets the already compiled version.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 396
3.6 Maintenance Protocol
There are two types of messages involved in the maintenance process, the tree update request
and the tree update reply. Nodes periodically sends update request message to its parent node
to update the parent node of the sub-tree and the density information. The parent node
receives the request message updates its contents and also forwards the message to its parent
node associate with its sub-tree and density information. The message continues until it
reaches the root node. Meanwhile the message forward upward to the parent node, the
purpose of maintenance protocol is also to detect if any node in the tree disconnect without
prior knowledge. If the node is missing, the necessary repair procedure is needed to repair the
structure of the tree. The repair procedure is similar to the section E.
Once the root node retrieves the update message, it updates its sub-tree information and the
total density of the tree. It then initiates the tree update reply message down to its children
nodes. The children node updates its own information and further sending down the message
to its children node. The process continues until reaches the leaf nodes. Split / Merge of nodes
process in this stage might be triggered if the density is exceeded or less than the threshold.
To avoid some pointers in the tree lost without prior knowledge, peers in the overlay network
holding the actual objects periodically randomly choose few objects and send the object
identifier to the nodes responsible for these objects. If the nodes do not have these pointers,
then the object pointers of these objects are added into the nodes.
3.7 Caching Protocol
Each node has a caching manager. The caching manager responsible to cache the object sets
of the previous queries and the location of the nodes in the attribute trees. These cache
information are store in a list and are associated with the counter and time. The counter
represents the number of times the cache being accessed. They are store using Least Recently
Used LRU approach. When the list in the cache is full or periodically, the cache objects with
the least counter and oldest time will be removed and the vacancy is for the new coming
cache objects.
4. Conclusion
In this paper, we present a preliminary design for a P2P object-oriented database on a DHT.
We utilize class hub and attribute trees for the multi-attribute and range queries. The
following summarizes contributions of our proposed design:
i. The split and merge operation in the attribute tree will make the attribute tree adaptive
to the changing of the attribute values.
ii. A lower-upper bound approach is adopted in order to search a range query more
effective.
iii. A store and forward method is adopted in our design to support multi-attribute query
to reduce the workload of the query originator as well as reducing the network traffic.
iv. Previous object sets are cached in the nodes along the routing path for faster query
response time.
v. Our design also caches the node identifier information for faster access to the attribute
tree avoiding bottleneck at a single point.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 397
5. References
[1] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek and H. Balakrishnan. Chord: A Scalable
Peer-to-peer Lookup Service for Internet Applications. ACM August 2001.
[2] A. Rowstron and P. Drucschel. Pastry: Scalable, decentralized object location and routing
for large-scale peer-to-peer systems. ACM International Conference on Distributed
Systems Platforms November 2001.
[3] B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph and J. D. Kubiatowicz.
Tapestry: A Resilient Global-Scale Overlay for Service Deployment. IEEE 2004.
[4] S. Ratnasamy, P. Francis, M. Handley and R. Karp. A Scalable Content-Addressable
Network. ACM August 2001.
[5] I. Clarke, O. Sandberg, B. Wiley and T. W. Hong. Freenet: A Distributed Anonymous
Information Storage and Retrieval System.
[6] R. Vilaca and R. Oliveira. Clouder: A Flexible Large Scale Decentralized Object Store.
WDDDM March 2009.
[7] A. R. Bharambe, M. Agrawal and S. Seshan. Mercury: Supporting Scalable Multi-
Attribute Range Queries. ACM August 2004.
[8] C. Sartiani, P. Manghi, G. Ghelli and G. Conforti. XPeer: A Self-organizing XML P2P
Database System.
[9] J. Yu, M. Yu, B. Wang, Y. Gu and J. Dai. A Peer to Peer Database Model Based on
Chord. IEEE 2008.
[10] J. Gao and P. Steenkiste. An Adaptive Protocol for Efficient Support of Range Queries in
DHT-based Systems.
[11] D. Wang and M. Li. A Range Query Model based on DHT in P2P System. IEEE 2009.
[12] M. Harren, J. M. Hellerstein, R. Huebsch, B. T. Loo, S. Shenker and I. Stoica. Complex
Queries in DHT-based Peer-to-Peer Networks.
[13] S. E. Bratsberg. Scaling a Highly-Available DBMS beyond a Dozen Nodes.
[14] C. Prada, M. P. Villamil and C. Roncancio. Join Queries in P2P DHT Systems.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 398
IMPROVE RECALL RATE AND REDUCE MESSAGE FLOODING BY USING
TWO-TIER BITWISE INTEREST ORIENTED QRP WITH ARTIFICIAL BEE
COLONY OPTIMIZATION FOR A SMALL WORLD PEER-TO-PEER SYSTEM
Choong Yong Liang & Lim Tong Ming
Sunway University College
School of Computer Technology
Bandar Sunway, Selangor, Malaysia
cgyl2002@gmail.com, tongminglim@gmail.com
Abstract
Every peer in an unstructured peer-to-peer (P2P) system will hold massive amount of data.
Peer self-organize and efficient search for resources are the main criteria to determine the
scalability of the P2P system. This research, the Small-World paradigm has been adopted in
P2P system to perform clustering and simplified artificial bee algorithm is used to improve
the search efficiency. The overlay network in Small-World network will archive high cluster
coefficient and low average hop between any two randomly chosen peers. Peers in Small-
World network will periodically perform rewiring-technique by disconnect out-date or
dissimilar interest peers and establishing new connection to similar interest peer to form
cluster. This process aims to improve the cluster quality and maintain short-range links to
connect to similar peers, at the same time peer will connect to medium-range and long-range
links that connect to other cluster based on different interest. Artificial bee algorithm allows
search function to search wider area by using short-range, medium-range and long-range
links. Simulated tests will be carried to evaluate message flooding and recall rate of the small
world P2P system. A prototype is used to compare with the original Limewire and the
proposed Small-World Limewire in order to propose potential future works.
Keywords Small-Wrold paradigm, Cluster, Peer-to-Peer (P2P) System, Bee Algorithm.
1. Introduction
Unstructured P2P systems such as LimeWire [1], Gnutella [13], and Freenet [14] provide
significance of distributed information sharing system. These models provide advantages of
decentralization by distributing the storage, bandwidth, information and computation cost
among peers. So that each peer can get information from many different source peers.
However, message flooding exists in these models, where query message is broadcast to all
peers to search for a desired piece of data.
To overcome message flooding issues, some research works [3, 4, 6, 7, 8] are
introduce Small-World paradigm to let peer self-organize into cluster. Two main properties
of Small-World paradigm are high cluster coefficient and low average hops between any
two randomly chosen peers. In order to archive high cluster coefficient, peer in the network
will periodically perform rewiring protocol [3, 6, 8]. The purpose of this protocol is to discard
dissimilar interest or out-date peers and establish new connection to similar interest peers.
The goal of rewiring protocol is to cluster all the peers in similar interest.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 399
In Small-World network, every peer will maintain short-range, medium range and
long range links. Short-range links will represent as intra-cluster links that connect to similar
peers and medium-range and long-range links will be representing as inter-cluster links that
are shortcut links to other cluster. The rationale behind those links are let cluster close to each
other, so that it can archive low average hops between any two randomly chosen peers.
After the Small-World network have been highly clustered, search function is more
efficient due to similar interest. By having artificial bee algorithm [16] for the search
function, the query message will route intelligently and make a small broadcast according to
interest of the cluster. This action will avoid query message flooding and peers will save
resources in handling irrelevant queries. So that, by implementing artificial bee algorithm will
further reduce the message flooding in the network compare to just simply broadcast message
in the network.
In this paper, we introduce how peers join effectively, so that the network still can
remain highly clustered when peers frequently join and leave. At the same time, we introduce
how peers maintain its routing path to achieve query message route intelligently. By
implementing Small-world paradigm into LimeWire, it enhances the join protocols and
routing path, we will show that message flooding can be reduced and improve accurate recall
rate.
This paper is organized as follows. Section 2 reviews some related work. Section 3
describes an overview of our P2P systems protocol. Finally Section 4 provides a set of
planned test scenarios and detail for the next stage of research activities with a set of expected
research outcomes.
2. Related Works
Quite recently several research projects that apply Small-World paradigm in unstructured
P2P networks [3, 6, 7, 8]. In a small world network, where peers are not neighbour of each
other still able to reach one and another by using small numbers of hops. Small-World
paradigm is originally introduced by Watts and Strogatz [4] had proposed the use of
rewiring technique to achieve high cluster coefficient and low average hops. High cluster
coefficient can be achieved by peer self-organization into same interest cluster and by using
rewiring technique with light randomness on the peers routing index will achieve low
average hops.
Zhang, Goel and Govindan[7] implemented Small-World paradigm to improve
freenet performance by distancing dissimilar peer interest and updating new peer information
in routing table, but there is a small possibility of evicting a peer from the list and adding a
dissimilar peer as a shortcut to other cluster.
Schmitz clustered peers by topic based on common ontology to achieve Small-World
paradigm [6]. Each peer will maintain short-range and long-range links, where short-range
links are of similar peers and long-range links are shortcut path to other clusters. At the same
time, peer will periodically check the similarity between neighbours, if neighbours similarity
is less than a threshold then rewiring technique will be executed, therefore look for new
connections and discard outdated links or dissimilar peer in the routing index.
Ng, Sia, Chan and King formed a cluster for fireworks routing strategy [5]. Peers
periodically broadcast messages to retrieve other peers information to update its short-range
links and maintain the cluster similarity. Long-range links are selected and maintained by the
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 400
user. After clusters have been formed then query will route through different clusters. Once
the query message hit the targeted cluster, then it will broadcast to all its neighbours and the
effect will be like exploding fireworks.
Raftopoulou and Petrakis used the similar rewiring technique with [3, 8] to
maintaining short-range and long-range links for peers. Raftopoulou extended the idea of
Schmitz by using document concept as an interest instead of concept from ontology. Petrakis
has implemented fireworks query [5] into Small-World network.
However, their works had two main problems: 1) peers connect randomly once they
join the network for the first time. So that, the network is difficult to achieve high cluster
coefficient when the peers join and leave too frequently. 2) Long-range links are randomly
selected, so query message will randomly route to different clusters. In Section 3, we have
proposed how peers select a cluster to join at the first time the network and how peer
maintains medium-range and long-range links to overcome random long-range links and
makes query message route accurately.
3. An Overview of the Proposed Design
In this section, we describe the Small-World P2P system with simplified artificial bee
algorithm aiming to improve the query search, peers clustering and its protocol design. Our
P2P system adopts the QRP table [1] to capture and represent interests to a peer. The Small-
World clustering technique in our research will periodically perform rewiring to cluster peers
who are of similar interests [3, 4, 6, 8]. The bee optimization algorithm [16] will be
simplified to enhance the search algorithm in the P2P system.
3.1. Architecture
The peers in the overlay network are categorized as LeafPeers and SuperPeers in our
chosen two-level hierarchical P2P system. The LeafPeers are located at the second level
connected to few SuperPeers. While a LeafPeer performs search, a SuperPeer acts as a proxy
for the LeafPeers to send out search messages to other SuperPeers to perform search tasks.
SuperPeers are more stable and powerful peers in terms of longer online time and better
bandwidth, no firewall blockage and newer operating system (OS) [1]. In contrast, LeafPeers
are not-so-stable peers with less online time and lower bandwidth. To identify peers interests,
a peer hashed all its files and files location into a QRP table. Since SuperPeers are more
powerful peers, so they will take the responsibility to periodically run the peer rewiring
protocol and form clusters based on their likelihood to contain similar content. Aggregation
of leaf peers QRP will stay with the SuperPeer so that such interest information could be
used for the SuperPeers to form short-range, medium-range and long-range links. Short-range
links are connections in the routing table that connects to other similar interest peers.
Medium-range and long-range links are connections in routing table that connects to un-
similar interest peers, so the links will function as a shortcut to other cluster. Query message
will route through different type of links is based on the interest similarity to look for target
cluster.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 401
3.2. Basic Protocols
The main idea behind Small World network is to let peers self-organize into clusters
of similar contents with some shortcut links to other cluster. In our proposed simplified bee
algorithm, the query execution is route intelligently to searching the targeted clusters and
makes a small broadcast within the cluster. In this section, we will discuss the basic protocols
and specify how peers maintain its interest using QRP table. The proposed mechanism allows
peers to join and leave a P2P network, to self-organize themselves into different clusters, and
to query data of interest to reduce message flooding and improve recall rate.
3.2.1 Query Routing Protocol (QRP)
Figure 1: QRP Table [1].
Every peer in a P2P network holds a QRP table. Figure 1 shown a QRP table is an
array of 65536 bits that consists of values 0 and 1. A QRP table will be initialized to 0,
which means that the peer initially does not have any interest. When a query message reaches
a SuperPeer and it hit 0 in the QRP table, then the searching for exact file will be blocked,
because the value of 0 in QRP table show that the file is not exist. LeafPeers QRP table
will aggregate to the SuperPeers QRP table, so that SuperPeers can use it to filter irrelevant
queries to reach LeafPeers. At the same time, SuperPeers will periodically exchange QRP
table with other SuperPeers to update their routing indexes, so that it will enable last hop
savings when searching the. Last hop saving will happen when a SuperPeer receives a search
message with Time-To-Live (TTL) value is one (1), and then it will check its neighbours
QRP. If the query message did not hit 1 in the neighbours QRP tables then the SuperPeer
that hold the query message would not send over to its neighbours. With the benefit of QRP
tables exchanges among SuperPeers, greater message flooding reduction could be achieved
in the network.
Filenames are used for keywords search in P2P system. When a peer shares a new file
named One Step at a Time.mp3, the hashing function will hash the file name, but not the
file content. Since the search function of the P2P systems is keyword based, the filename will
be separated into words such as One, Step, at, a and Time. Then the hash function
will change those keywords to a lower case using a locale-neutral conversion based on the
UTF-16 representation of the text [1]. The hashed value will be used to update the QRP table
so that the QRP table will hold the interest of what the peer shares.
3.2.2 Joining Protocol
As peer p
i
joins the P2P network; it will follow the join protocol. Initially, p
i
will
hash(file
i
) from all its share files (FILES
i
) into its QRP table as the interests QRP(p
i
), where
hash(files
i
) is the hash function to hash every single file. Then p
i
will send BOOTSTRAP
message to UDP Host Cache (UHC) [1] to retrieve IP addresses and port numbers of
available SuperPeers (SP). From the list of SP, p
i
will request their QRP table and perform
sim(QRP(p
j
), QRP(p
i
)) as bitwise checking and select max(sim(QRP(p
j
), QRP(p
i
))) as most
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 402
similar SuperPeers. Then, p
i
will connect to the selected SuperPeers and join as LeafPeer.
Since, LeafPeer QRP table will aggregate with SuperPeers QRP table, so LeafPeer having
similar interest with SuperPeers will make small changes in their interest. After p
i
stay in the
P2P network with long expected uptimes and it has suitable operating system, sufficient
bandwidth and no firewalled, then p
i
will upgrade becoming SuperPeer else it will remain as
LeafPeer. To achieve efficient routing, SuperPeer p
i
will maintain separate routing index RI
i
,
which contains short-range links, medium-range links and long-range links. SuperPeers will
exchange QRP table with each other, so that it will enables last hop savings when searching
the network. So that each entries in the routing index are form by (ip(p
j
), QRP(p
j
)), where
ip(p
j
) is IP address of p
j
and QRP(p
j
)
is the QRP table of p
j
.
----------------------------------------------------------------------------------------------------------------
Algorithm 1: Algorithm for join protocol
----------------------------------------------------------------------------------------------------------------
for all file
i
FILES
i
do
QRP(p
i
) = QRP(p
i
) hash(file
i
)
end for
forward BOOTSTRAP message to request SP
for all QRP(p
j
) SP
do
compute sim(QRP(p
j
), QRP(p
i
))
end for
attempt to connect to max(sim(QRP(p
j
), QRP(p
i
))) where QRP(p
j
) SP
----------------------------------------------------------------------------------------------------------------
3.2.3 Rewiring Protocol
Rewiring protocol will be execute periodically for each SuperPeer maintain its short-
range, medium-range and long-range links, where short-range links can be represented as
intra-cluster links that connect to similar interest peers and long-range links can be represent
as inter-cluster links that are a shortcut path to other clusters. In rewiring protocol, SuperPeer
pi will periodically compute AS
i
= (1 / s)
pj
RIi sim(QRP(pj), QRP(p
i
)) as average
similarity among neighbours in its routing index (RI
i
), where s is the number of short-range
links. If AS
i
is greater or equal to threshold then p
i
will not continue the rewiring protocol.
Otherwise, p
i
will create FINDPEERS message with parameters (ip(p
i
), QRP(pi), P, t
r
), where
P is an empty list to collect peers info and t
r
is the time-to-live (TTL) of the message.
A peer p
j
receives FINDPEERS message then it will append its IP address and QRP
table into P then reduce t
r
by one and forwards the message to m selected neighbours peers.
Message will send through m 2 most similar interest peers in short-range links. At the same
time, message will send to one medium-range and one long-range range link as well. So that,
message have the chance to explore different clusters.
When t
r
= 0, the FINDPEERS message will return to the message creator p
i
. Peer p
i
will categories the peer info from list P to update its RI
i
. Peer p
j
0.7 will be used to update
short range-links and discard outdated links or dissimilar interest links. Peers similarities
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 403
within 0.5 p
j
< 0.7 will be use to update medium-range links and p
j
< 0.5 will be use to
update long-range links. With various range of medium-range links and long-range links
allow a shortcut path to other clusters.
The rationale behind the rewiring technique to maintain the short-range, medium-
range and long-range links is to archive the properties of Small-World paradigm.
Periodically perform rewiring will maintain the links in the routing indexes up-to-date. By
refining the short-range links to maintain similarity interest in the intra cluster will archive
highly cluster. Maintaining medium-range and long-range links is to provide several path to
let query message can route to the nearest cluster based on the similarity on the interest, so
this will archive the low average hops within a peer to another peer.
----------------------------------------------------------------------------------------------------------------
Algorithm 2: Algorithm for rewiring protocol
----------------------------------------------------------------------------------------------------------------
compute AS
i
= (1 / s)
pj
RIi sim(QRP(pj), QRP(p
i
))
if AS
i
< (threshold) then
P = { }
Create FINDPEERS message = (ip(p
i
), QRP(pi), P, t
r
)
//forward FINDPEERS message to m selected peers
forward FINDPEERS to p
j
where p
j
RI
i
and j = 1,, m
P = P (ip(p
j
), QRP(p
j
))
end if
repeat the above procedure for p
j
s neighbours
until t
r
= 0
----------------------------------------------------------------------------------------------------------------
3.2.4 Query Process Protocol
Honey bees in nature [16] explore large number of food sources by travel over long
distances (more than 10km) and multiple directions. Scout bees are sending to search for food
from one area to another. After search complete, scout bees will return to bee hive and
perform waggle dance to show the quality of the food and the direction and the distance of
the food location. This information will be used to determine how many follower bees are
going to follow the scout bee back to harvest the food. More promising area of food sources
will have more follower bees to search the nearby area. While harvesting the food, some bee
in the bee hive will monitor the food level to determine whether need to send scout bees for
looking more food. Honey bees behaviour [16] can be summarised in to bees algorithm,
which shows in Figure 3.
----------------------------------------------------------------------------------------------------------------
Generate scout bees and send for random search.
Compute fitness value from scout bee search areas.
Recuit bees for selected areas base on the fitness value. //more bees for better areas
repeat the above procedure to search different areas.
until the stopping criterion is met.
----------------------------------------------------------------------------------------------------------------
Figure 3: Pseudo code of the basic bees algorithm.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 404
We have applied simplified bee algorithm in our query process protocol to make
query route intelligently. There are two advantages of bee algorithm in query process: Firstly,
search is extended to wider area for scanning in an unknown space, this will archive in our
P2P system by using medium-range and long range links to let query message go through
other cluster. Secondly, searching effort will be based on the quality of the area, instead of
simply broadcast in the network, we make peer intelligently to determine number of
broadcast in nearby area. We have proposed to simplify two parts of bee algorithm [16] in
our query process protocol. Firstly, instead of scout bee is routed randomly, we select path by
exploiting medium-range and long-range links properties in our routing protocol so that
search can be more efficient and able to reach further place. Secondly, in contrast to scout bee
return to bee hive and recruit bees, we let scout bee to make local decision for sending out the
follower bees to search in the nearby areas.
While a LeafPeer performs search in the query process protocol, a SuperPeer acts as a
proxy for LeafPeer to send task. So that, only SuperPeer will send to the neighbours, which is
others SuperPeers to perform search. When SuperPeer p
i
create a QUERY message q
i
or
receive a QUERY message q
i
from its LeafPeer, peer p
i
will send a QUERY message q
i
through its neighbours peers. QUERY message q
i
will act as scout bees and they will go to
further place to look for source through medium-range or long-range links. When a peer p
j
receives QUERY message q
i
, p
j
will execute function hit(q
i
, QRP(p
j
)) to check whether the
keywords in q
i
will produce a hit in QRP(p
j
). If its produce a hit then p
j
will do further
checking to look for the actual document. If the document(s) are found then p
j
will append its
IP address and founded document(s) into list R. Then, scout bee will make a local decision to
send follower bees to search nearby neighbours base on the quality of the area, which is
sim(q
i
, QRP(p
j
)) similarity between q
i
and QRP(p
j
). If the similarity is high then more
follower bees will be send, which means broadcast query messages with higher TTL t
b
through the p
j
s neighbours. Otherwise, fewer follower bees will be sending by broadcast
query message with fewer TTL t
b
or no broadcast query message will be send if met low
similarity. After local decision, scout bee will continue to search for more sources by route
through few high similar medium-range or long-range links. Since peer p
j
having neighbours
QRP, so that selection of medium-range or long-range links is max(sim(q
i
, QRP(p
k
)))
where p
k
is the medium-range or long range links in routing index of p
j
, p
k
RI
j
. Until the
query is done then RESULT(R) with the list R will return back to p
i
, then from number of
collected result, bees will determine whether to perform another search. Query process will
be stop when the number of result is met the desire amount or three times attempted (A
i
).
Notice that t
b
is the TTL for broadcasting to all short-range links when the query
message hit the targeted cluster and t
f
is the TTL for forwarding the query message to look
for targeted cluster. Typically t
f
> t
b
, since query message is in targeted cluster, so small
hops broadcasting is needed to reach similar interest peers and t
f
allow more hops to reach the
targeted clusters. Last hop savings will happen when t
b
is one, because peer p
j
can check its
neighbours QRP table and query message will only send to those peers that produce a hit.
The main idea of applied bees algorithm and having QRP table will help to reduce the
message flooding in the network. Thus peers will save resource by handling irrelevant
queries. In contrast to random route the query message to look for targeted clusters [3-8], we
enhance the route path by using medium-range and long-range links to achieve more accurate
routing.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 405
----------------------------------------------------------------------------------------------------------------
Algorithm 3: Algorithm for query process protocol
----------------------------------------------------------------------------------------------------------------
if hit(q
i
, QRP(p
j
)) == true then
if found(q
i
, d
j
) == true then
R = R (ip(p
j
),d
j
)
end if
end if
if QUERY message with t
f
then
if sim(q
i
, QRP(p
j
)) > 0.9 then
t
b
= 2
forward QUERY message to all short-range links in RI
j
else if sim(q
i
, QRP(p
j
)) > 0.7 then
t
b
= 1
forward QUERY message to all short-range links in RI
j
, where QRP table produce a
hits
end if
t
f
= t
f
1
forward QUERY message to medium-range or long-range links in RI
j
else if QUERY message with t
b
then
t
b
= t
b
1
if t
b
== 1 then
forward QUERY message to all short-range links in RI
j
, where QRP table produce a
hits
else
forward QUERY message to all short-range links in RI
j
end if
end if
repeat the above procedure for p
j
s neighbours
until t
f
= 0 or t
b
= 0
forward RESULT(R) back to p
i
repeat the above procedure for un-query peers
until result met desire amount or A
i
= 3
----------------------------------------------------------------------------------------------------------------
4. Planned Test Scenarios and Conclusion
This section provides a set of planned test scenarios and detail for the next stage of
research activities with a set of expected research outcomes.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 406
4.1. Planned Test Senarios
Since, the P2P system environment needs a few thousand peers so that the test will be
carried out using P2P simulation software on performance and scalability factors such as
reducing message flooding and improving accurate recall rate.
We simulated 10,000 peers in our network and let them self-organize. Each five
minutes, rewiring protocols will be executed periodically. If the average similarity among
neighbours is less than 0.7 then peers will create a FINDPEERS message with TTL t
r
= 6 to
refine the cluster. At the same time, each five minutes will send a QUERY message where t
f
= 6 and t
b
= 2. Since t
r
and t
f
are forward message to small amount of neighbours, so that
suitable number of TTL will increase the number of visit different cluster and t
b
need to be
small, since message is in targeted cluster so it just need small number of hops to reach all
similar interest peers.
We are measuring our P2P system on performance and scalability factors such as
reducing message flooding and improving accurate recall rate. These two factors will be used
to compare with the original LimeWire and the improved LimeWire. We will test on two
environments, first test is the environment which is highly clustered with stable peers and
second test is the environment that peers dynamically join and leave. Test result such as recall
rate and message in the network will be recorded every five minutes.
4.1. Expected Research Outcomes against Objectives
Instead of broadcasting for search data information, our P2P system is able to route
query intelligently and have high recall rate. Consequently the message flooding will be less
than the broadcasting P2P system, such as LimeWire. High recall rate will be measured by
using a number of retrieval relevant results between our P2P system and LimeWire.
Conclusion
This paper proposes to enhance the join protocol by selecting peers of similar interest
so that the proposed P2P system always maintains high cluster coefficient in the network.
We also proposed medium-range and long-range links to improve the query route
intelligently by selecting suitable path. The implemented Small-World paradigm in the
Limewire will achieve high cluster coefficient and low average hop between any two
randomly chosen peers. Bee algorithm will also route each query message intelligently and
base on the similar interest to make suitable broadcast. QRP table will filter irrelevant search.
By using bee algorithm and QRP table will avoid message flooding and saving resource in
handling irrelevant search.
References
[15] LimeWire. http://www.limewire.com.
[16] K.Y.K. Hui, J.C.S. Lui, and D.K.Y. Yau. Small-world Overlay P2P Networks:
Construction, Management and Handling of Dynamic Flash Crowds. Computer Networks,
50(15), 2006.
[17] P. Raftopoulou and E.G. M. Petrakis. iCluster: a Self-Organising Overlay Network for
P2P Information Retrieval. In ECIR, 2008.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 407
[18] D. J. Watts and S. H. Strogatz. Collective Dynamic of Small-World Networks.
Nature, 393, 1998.
[19] C. H. Ng, K. C. Sia, C. H. Chan and I. King. Peer Clustering and Firework Query
Model in the Peer-to-Peer Network. In WWW, 2003.
[20] C. Schmitz. Self-Organization of a Small World by Topic. In P2PKM, 2004.
[21] H. Zhang, A. Goel and R. Govindan. Using the Small-World Model to Improve
Freenet Performance. In SIGCOMM, 79, 2001.
[22] P. Raftopoulou and E. G. M. Petrakis. A Measure for Cluster Cohesion in Semantic
Overlay Networks. In LSDS-IR, 2008.
[23] S. Ratnaswamy, P. Francis, M. Handley, R. Karp and S. Shenker. A scalable content-
addressable network. ACM SIGCOMM, 2001.
[24] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A peer-to-
peer lookup service for internet application. ACM SIGCOMM, 2001.
[25] A. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location and
routing for large-scale peer-to-peer systems. 18
th
IFIP/ACM Int. Conference on
Distributeed System Platforms, pg 329-350, 2001.
[26] M. Li, W. C. Lee, A. Sivasubramaniam. Semantic Samll World: An Overlay Network
for Peer-to-Peer Search. In IEEE, 2004.
[27] Gnutella. http://www.gnutella.co.uk.
[28] I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous
information storage and retrieval system in designing pricacy enhancing technologies.
International Workshop on Design Issues in Anonymity and Unobservability, 2001.
[29] B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-
tolerant wide-area location and routing. Pages Tech. Report, UBC/VSD-01-1141, U.C.
Berkeley, 2001.
[30] D.T.Pham, A.Ghanbarzadeh, E.Koc, S.Otri, S.Rahim, M.Zaidi. The Bees Algorithm
A Novel Tool for Complex Optimization Problems, anufacturing Engineering Centre,
Cardiff University, Cardiff CF24 3AA, UK, Proceedings of IPROMS 2006 conference,
pp.454-461.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 408
TWO-WAY DYNAMIC QUERYING AND MESSOR ANT COLONY ALGORITHM
IN RESOURCE DISCOVERY MANAGEMENT SYSTEM WITH IMPROVED
QUERY RESPONSE TIME AND MEMORY OVERHEAD REDUCTION
Teng Ri Sen, Lim Tong Ming
Sunway University College
School of Computer Technology
Bandar Sunway, Selangor, Malaysia
risen85@gmail.com, tongminglim@gmail.com
Abstract
In recent years, popularity of peer-to-peer systems has been increasing rapidly. Structured
Peer-to-Peer (P2P) systems such as Distributed Hash Table (DHT) systems offer scalable key
look up for specified resource among peers in an overlay network. However, most of the
DHT overlay networks dont support multiple attributes and range query since DHT only
provides constant (or key-based) hashing in the network and it sacrifices the locality of every
value that stores in peers. Therefore, DHT cannot be directly applied to P2P Grid resource
information service. Query schemes such as MAAN [1], Mercury [2], SWORD [3] and P-
Grid [4] were developed to solve the above problem. However, they apply sequential search
rather than parallel search which is faster and more efficient. [1] and [2] encountered memory
overhead when updating dynamic attribute value. This research intends to improve the query
response time of the Multi-Attribute Addressable Network (MAAN) by proposing an
Enhanced Dynamic Querying with concurrent execution of query search from both lower and
upper bounds peers using a controlled pheromone as it grows rapidly. The Messor Ant
Colony Algorithm is adopted to improve the resources update protocol in order to constantly
but cost effectively updates resource information to all peers. Tests will be carried out to
evaluate the query response time and routing cost comparing with other P2P grid systems by
increasing the number of peers with various levels of query complexity.
Keywords: peer-to-peer system (P2P), Grid, Chord, Resource Discovery management
I. INTRODUCTION
A Grid Computing is hardware and software infrastructure that provides dependable,
consistent, pervasive and inexpensive access to high-end computational capabilities, allowing
coordinated resource sharing and problem solving in dynamic, multi-institutional Virtual
Organizations (VOs). Grid computing requires an efficient resource registration and lookup
services to query resources based on the user requirement. Traditional approach uses a
centralized server to index the resource information. For example, LDAP based index
services called MDS which implemented in Globus [5] to store, monitor and discover
resources in a grid platform. However, this approach has an inherent drawback of single point
of failure. When the index server was disconnected or malfunction, the grid computing
service will stop function as there is no resource information available.
To overcome the single point of failure, Adriana Iamnitch et al [6] proposed a P2P
approach to organize the resource information of every peer instead of the conventional
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 409
centralized approach. Resource requestor uses unstructured P2P network such as Gnutella [7]
as query propagation. Even that unstructured P2P systems eliminate the single point of failure
problem but the message propagation generates large amount of query message flooding in
the network which may cause network congestion. In order to eliminate this problem, a Time-
to-Live (TTL) value is used to manage the number-of-hop permitted in any query search so
that the problem could be controlled. However, the search result produced may not be
guaranteed at all.
In order to improve the search result and guarantee that the query produces the desired
resource information, many data indexing methods have been proposed. The most promising
one is Distributed Hash Table [8] (DHT) based systems. In these systems, every data item is
associated with a key obtained by hashing an attribute of the object (e.g. its name). Every
node in the network is responsible for maintaining information about a set of keys and their
associated items. They also maintain a list of adjacent or neighboring nodes for routing
purposes. The query will hash into the search key and propagate to the network. When a peer
receives a query, if it does not have the requested items, it forwards the query to its neighbors
having keys which are closer to the requested one based on the neighbor or adjacent list.
Besides that, data replication can ensures that queries eventually reach a matching data item.
II. RELATED WORK
This section reviews some of the resource discovery management approaches that are based
on P2P underlying network:
Scalable, Efficient Range Queries for Grid information services was proposed by
Andrzejak and Xu [9] using CAN overlay network which supports range queries when
searching for resources. Their proposed approach applies different DHTs for different
attributes. In this network, each node supervises an interval of an attribute domain, which is
called interval. The node itself is called Interval Keeper (IK). They use Space Filling Curves
especially Hilbert function [10] to map between intervals and zones in d-dimensional space.
This can ensure that the IK that has nearby intervals are also mapped into nearby zones of
space. When performing message flooding, author proposed 3 different strategies of message
flooding: Brute Force, Controlled Flooding, and Directed Controlled Flooding.
[2] has proposed Mercury, a scalable protocol for searching resources in multi-attributes
and ranged query. Mercury use Chord network as the underlying network. In Mercury
network, data item represented as a list of typed attribute-value pairs. Mercury support
queries over multiple attributes by partitioning peers in the system into groups called attribute
hub. Each hub represents each attribute in the overall schema. Every node will register into
the specified hub and each node also maintains a link to each of other hubs. So, when
performing query, the query will send to one of the node in the specified attribute hub. The
node will check its data with the query and write it into the result if the query matched. After
that, it will send the query and result to another node using successor list and the process
iterated until end of the attribute hub. The last node in the attribute hub will send the query to
another node in other attribute hub using the link that mentioned above. The gathered results
will intersect and pass back to originate node.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 410
In [4], P-Grid consists of Pastry and Kademlia network to resemble a P-Grid network. P-
Grid use key as the identifier to locate resource but key space of the P-Grid is recursively
bisected such that partitions carry same workload. The bisected approach is similar to the
tree/hierarchical model but the different is each peer in the P-Grid maintains the references of
some other peers in the routing table so that there is no hierarchy in the tree structure since
the P-Grid can randomly hop to different root of the tree for searching resources. In query
process, originate node send a query message to node P. node P will check the key is within
prefix of its index list. If yes, the node P return index list to originate peer. If not, node P
determines peers in the index list which has the similar prefix of the key in routing table and
send the query to the other node based on the index list. The process iterate until key is within
the index list.
In [2], [4], [9] they have the common drawback in which they have to query the resources
in other attribute after an attributes resources have been finished query. Furthermore, the
resource information that gathered may duplicate so intersection is needed to eliminate the
duplication resource information. But they have its own novelty, in [9], light weight of
resource information to be update since there is less amount of information in the routing
table. For [2], Mercury uses novel light-weight sampling mechanisms for uniformly sampling
random nodes in a highly dynamic overlay network to guarantee load balancing. In [4], by
using the bisection approach, every partitions carry the same workload and P-Grid do not
inherent the single point of failure even though P-Grid is a tree network.
III. CHORD
In this section, we briefly explain one of the DHT system, Chord which proposed by Ion
Stoica et al [11]. In Chord, peers have gone through a hash function called SHA-1 in order to
convert them to IDs. The IDs can be obtained by hash the IP address of the current peer.
Chord supports <key, object> for resource registration and lookup operation. Chord organizes
the peers into a one dimensional circle with modulo 2
m
where the m is the number of bits in
the node identifier and objects key.
Besides, every peer in the Chord network maintains 2 neighbor list, Successor list and
finger table. The organization of nodes to store in the successor list is immediately followed
by the current node in the identifier space. On the other hand, the finger table maintains nodes
that spaced exponentially around the identifier space. When a node n, request for resource
with a key K, it will check on nodes in the successor list. If there is no match in the successor
list, node n can forward the query to a far node in the finger table, which much closer to the
resource node. The process will iterate until key K match with the ID of resource node. So
the average hop number for lookup a resource is O(log N) for a Chord system with N nodes
in the network. Furthermore, Chord has a stabilization function to maintain finger table and
successor list when a node joins or leave
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 411
IV. DESIGN
In this section, we propose different resource querying and resource updating algorithms
using MAAN architecture as the basis of the design.
A. Basis of the Proposed Design: The MAAN Architecture
In this research, we adopt the design of MAAN architecture as the basis of our P2P grid
system where our proposed algorithms could be tested. Detailed MAAN design is available in
[1]. The proposed design will be constructed using openChord [12], an open source P2P
system that implements the Chord overlay network. OpenChord uses SHA1 hash function to
hash nodes and objects ID. When peer lookups for a resource, it uses the consistent hash to
map keys to nodes ID. However, SHA1 hashing function destroys the locality of keys [1]. So,
we use SHA1 hashing to assign every peer and its attributes value that belongs to string type.
For example, OS type, Computer Name and URL are belong to string type and they do not
have to arrange by order so lookup service that provided by openChord can handle string
type. As for numerical values, the locality preserving hashing function is used to register
each attributes value. Each registration is composed of a <attribute-value, resource-info>
pair. Each node is responsible to maintain the information of the registered keys that fall into
the key space sector. By using the local preserving hashing function, the attribute value can
restructure into ascending or descending order. Every resource has to register its attributes
value into a different DHT based on corresponding attribute.
In information routing mechanism, each node maintains a finger table with predecessor list
and successor list in order to do routing. The successor list is similar with Chord but
predecessor list is composed of multiple peers instead of one peer in Chord. The purpose of
predecessor list is to ease for backward routing when querying the resources. Backward
routing using predecessor list will be review in section 4.2.
B. Resource Querying Protocol
in the resource querying, we assume each resource has M attributes with a
1
, a
2
, a
3
,a
M
, O be
the originate node that initiates the search, L be the low boundary of peer, U be the upper
boundary of peer, and R
d
be the desired number of result, X be the array of satisfying list, a be
the list that store all the attributes and t be the number of routing. Initially, peer O determines
the low and upper boundaries in particular attribute in M attributes. After determined, the
peer O propagate a query to search L using DHT key lookup service that provided by
openChord. Once L was being found, the information of L will be record down and the query
will continue searching U and record down U peers information also. The query will send
the information back to originate peer once both L and H have been searched. So, the peer O
send query with (X, a, t) to L and U peer. For L peer, it check the local resources with the
attributes that store in a. if all attributes criteria fulfilled, then the peers information will be
store into satisfying list, X. after that, the peer will pass the query with (X, a, t-1) to its
neighbor peer based on successor list. On the other hand, U peer perform the same action as L
peer but U peer is performing backward routing and pass the query to neighbor using its
predecessor list.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 412
While each peer executed query and pass to neighbor peer, the peer leave a pheromone at
the current peer. The purpose of the pheromone is to track down that the current peer was
being visited. The pheromone will disappear when going through a certain time or received
delete message. So, this process continues until low boundarys query meet the upper
boundarys query or they meet each other pheromone. During low and upper boundary
performing query propagation, they send the X result back to originate peer to compare with
R
d.
if number of result in X is more or equal to the R
d
, the query process can be stop since the
desired number of result was achieved. Otherwise, an iterative process will proceed.
Originate Peer
Low Boundary Peer
Upper Boundary Peer
(
X
,
a
,
t
)
(
X
,
a
,
t
)
(X
, a
, t-1
)
(
X
,
a
,
t
-
1
)
Figure 1: query propagation in the network
In the iteration, 1) node O calculate the ratio between current number of gathered result
and number of node that queried. 2) Node O calculates number of desired result that lack of.
3) With the ratio and the remaining number of desired result, node O can calculate number of
hop that required or Time-to-Live(TTL) to reach the R
d
. 4) node O send the query with the
TTL to the associate peers that return the X to the node O. 5) node O wait for an amount of
time that needed for query propagate and X return time.
The process above is repeated until the desired number of result reaches or there are no
more fingers to be propagated, or the low and upper boundary propagation meets with each
other pheromone.
Resource Querying Algorithm
LowNUpperBound= getLowNUpper(a);
LowNUpperPeer= O.getLowNUpper(LowNUpperBound);
O.sendLowBoundQuery(X,a,t);
O.sendUpperBoundQuery(X,a,t);
Sleep(time for waiting Low and Upper send result back);
While X<R
d
and MeetPheromone is not true do
Ratio= X/Peers that queried
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 413
PeerThatLackof = R
d
X
t = PeerThatLackof * Ratio
O.sendLowBoundQuery(X,a,t,LowPeerStopPreviously);
O.sendUpperBoundQuery(X,a,t,UpperPeerStopPreviously);
Sleep (time for waiting Low and Upper send result back);
End while
method sendLowBoundQuery(X,a,t){
X= checkResource(a);
If(t not equal to 0)
{
nextPeer= currentPeer.getNextPeer(SuccessorList);
sendLowBoundQuery(X,a,t-1, nextPeer);
}else
{
Return(X);
}
End If
}
C. Resource update protocol
For attribute registration mechanism, [1] indicated that every resource has to register all
attribute values into corresponding attribute hubs. So, it incurs more updating of attribute
values change. The resource updating can become serious since P2P network is in dynamic
environment. Every peer can join and leave simultaneously and dynamic resource such as
CPU usage, Memory usage can be varying. In order to overcome the problem, Messor Ant
algorithm [13] can be adopted to reduce the updating cost.
Messor Ant algorithm can describe in following rules: (1) if the ant do not carry resource,
the ant wanders randomly to look for resource. (2) The ant wanders randomly until it
encounters a resource and picks it up. (3) The ant wandering around while carrying the
resource (4) when the ant found the suitable nest, it put down the resource and search for the
other resource.
So, in Resource Update Protocol, every peer has a countdown timer which indicates that
the peer resource information has been out-dated. Certain amount of Messor Ants has
triggered and wanders in the network. Basically, the ant has 2 states: Search out-dated state
and Search Resource state. While they wandering in the network, they are in Search out-dated
state and they looking for which peer has been out-dated. Once the ant found the out-dated
peer, the ant change the state into Search Resource state and go to the corresponding peer to
gather new resource information based on the routing information that provided by the out-
dated peer and return the information back to the out-dated peer. The out-dated peer rewrites
the resource information and reset the countdown timer. Once the process done, the ant
change its state back to Search Out-dated and search for out-dated peer again.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 414
Resource update algorithm
Ant antA= new Ant();
antA.state= Search_Outdated;
NextNode= antA.goToNextNode(FingerTable);
do
{
If(NextNode is outdated)
{
antA.State= Search_Resource;
LatestResource= Ant.getLatestResource(NextNode.Resourceinfo);
NextNode.Rewrite(LatestResource);
NextNode.resetTimer();
antA.addVisitedStorage(NextNode);
antA.state= Search_Outdated;
}
End If
}while( NextNode= antA.goToNextNode(NextNode.FingerTable) );
Furthermore, the ant would not just wander around randomly. After complete update an out-
dated peer, the ant collects the newly updated peer information and store into a Visited
Storage. So when the ant chooses a peer in the finger table to wander, the ant firstly checks
on the Visited Storage, and skip the peer that appear in the Visited Storage. The Visited
Storage has limited entries. If the Visited Storage is full, the oldest entry will replace by the
new entry. So with this Visited Storage, the newly update peer would not be the priority to be
choose for update. If the peer in the finger table are all inside the Visited Storage, the oldest
entry peer will be choose to perform out-date checking.
V. CONCLUSION
This paper proposes adopting two-way Dynamic Querying into Resource Querying Protocol
in purpose of reduces query time since there are 2 waves of propagation performing at the
same time instead of sequential search. Furthermore, the enhanced dynamic query helps to
reduce the number of hop when query hits achieved the desired resource. On the other hand,
the resource updating protocol that adopted Messor Ant algorithm can reduce updating cost
since the resource update is controlled by the ant.
Currently, this paper proposes a preliminary idea which has not been tested by building the
prototype. The next phase of the research would involve building prototype of this algorithm
and also to simplify the algorithm and process involved in this approach.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 415
VI. REFERENCES
[1] Min Cai, Martin Frank, Jinbo Chen, and Pedro Szekely. Maan: A multi-attribute
addressable network for grid information services. In GRID 03: Proc. of the 4
th
Int.
Workshop on Grid Computing, page 184, Washington, DC, USA, 2003. IEEE Computer
Society.
[2] Ashwin.R, Mukesh.A, and Srinivasan.S. Mercury: Supporting Scalable Multi-Attribute
Range Query. ACM SIGCOMM Computer Communication Review, Volume 34, Issue
4, 2004
[3] Jeannie Albrecht, David Oppenheimer, David Patterson, and Amin Vahdat. Design and
Implementation Tradeoffs for Wide-Area Resource Discovery. ACM Transactions on
Internet Technology (TOIT), 8(4), September 2008.
[4] Karl Aberer, Philippe Cudr-Mauroux, Anwitaman Datta, Zoran Despotovic, Manfred
Hauswirth, Magdalena Punceva, and Roman Schmidt. P-Grid: A self organizing
structured P2P system. SIGMOD Record, 32(2), September 2003
[5] Foster, I., Kesselman, C., Nick, J. M. & Tuecke, S. (2002), The Physiology of the Grid:
An Open Grid Services Architecture for Distributed Systems Integration.
http://www.globus.org/research/papers/ogsa.pdf.
[6] A. Iamnitchi, I. Foster, and D. Nurmi. A peer-to-peer approach to resource discovery in
grid environments. In Proceedings of the 11th Symposium on High Performance
Distributed Computing, Edinburgh, UK, August 2002.
[7] A. A. Fisk (2009).Gnutella Dynamic Query Protocol v0.1
http://www.the-gdf.org/wiki/index.php?title=Dynamic Querying.
[8] R. Steinmetz and K.Wehrle (2005). Peer to Peer Systems and Application. Springer Link
[9] Artur Andrzejak and Zhichen Xu. Scalable, efficient range queries for grid information
services. In P2P 02: Proc. of the Second Int. Conf. on Peer-to-Peer Computing, page
33, Washington, DC, USA, 2002. IEEE Computer Society.
[10] T. Asano, D. Ranjan, T. Roos, E. Welzl, and P. Widmaier, Space Filling Curves and
Their Use in Geometric Data Structures, Theoretical Computer Science, 181, 1997, pp.
3-15.
[11] Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek,
Frank Dabek, and Hari Balakrishnan. Chord: a scalable peer-to-peer lookup protocol for
internet applications. IEEE/ACM Trans. Netw., 11(1):1732, 2003.
[12] Open Chord, Distributed and Mobile Systems Group of Bamberg University, 2008-04-
11http://open-chord.sourceforge.net/
[13] Montresor, A., & Meling, H. (2002). Messor: Load-Balancing through a Swarm of
Autonomous Agents. Science, (September).
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 416
A CONCURRENCY CONTROL APPROACH FOR P2P OBJECT-ORIENTED
DATABASE SYSTEMS IN A WIRELESS LOCAL AREA NETWORK
ENVIRONMENT
Wong Wai Keong & Lim Tong Ming
Sunway University College
School of Computer Technology
Bandar Sunway, Selangor, Malaysia
androis@gmail.com, tongminglim@gmail.com
Abstract
One of the core areas of study for a P2P Object-oriented Database Management System
(POMS) is the concurrency control. It manages concurrent transactions accessing to a
common pool of objects simultaneously to ensure that these transactions commit successfully
while preserving the consistent state of the database. In a P2P Wireless Local Area Network
(WLAN) overlay, the optimistic concurrency control is much desired due to its non-blocking
and deadlock free nature. However, it suffers from setbacks of late conflict detection that
leads to wasted transaction abort, especially for near-to-complete transaction. The issues of
frequent leave and join of peers and inconsistent wireless connectivity further increases the
wasted transaction abortion rate. This could be worse for long duration transaction.
Therefore, conventional concurrency control approach is inappropriate since they do not cater
for such issues. This paper proposes an optimistic concurrency control approach that
implements two phase validation, multiversion dynamic adjustment of serialization order, and
timeout control. The two phase validation splits the conventional validation phase into pre-
validation and post-validation to perform early conflict detection while maintaining the pre-
commit validation. While conflicting transactions are not aborted immediately, their sequence
is reorganized to determine whether it is committable first. The effects of P2P WLAN
overlay are handled by timeout control where transactions proceed and commit based on the
given time frame. Unless violated, the transaction has higher chances of committing to the
database.
Keywords optimisitc concurrency control, dynamic adjustment for serialization order,
P2P object-oriented database systems
Introduction
The P2P object-oriented database is a collection of autonomous peers which contain local
databases [1]. The data stored is represented in the forms of objects (as described in object-
oriented paradigm). It is connected by the P2P paradigm. In this paper, it is referred as
POMS. Unlike conventional client-server paradigm, P2P paradigm allows peers to provide
and receive service [1], for instance a peer allows others to access its data while it accesses
others. While WLAN environment has the benefits such as allowing transaction to be
committed anywhere anytime compared to wired-connected environment, it introduces new
challenges to the conventional concurrency control approach. These new issues include
frequent leave and join of peers, inconsistent data transmission rate, frequent disconnection or
distortion, and limited bandwidth coverage (unreliable wireless connection) [2, 3, 4]. Since
conventional concurrency control approaches do not cater for these issues, they are
insufficient providing concurrency control management for multiple concurrent transactions.
Therefore, these approaches are inefficient handling concurrent transactions especially long-
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 417
duration transaction in WLAN environment. Thus, concurrency control approach that cater
for the above mentioned issues is required to ensure concurrent transaction execute
successfully without jeopardizing the consistent state of the database.
Although optimistic concurrency control protocol has the advantage of being non-blocking
and deadlock-free [5], while preserving the correctness of the database, compared to
pessimistic concurrency control which makes it attractive to POMS in a WLAN environment,
it suffers from the issue of late conflict detection that causes wasted transaction restarts. Since
optimistic concurrency control delays its validation process late conflict detection it
introduces the issue of near-to-complete transaction restarts. There are two ways performing
validation backward validation and forward validation [6, 8, 9]. According to [6, 8],
backward validation is performed against committed transactions while forward validation is
carried out against active transactions where only validating transaction is restarted by
backward validation while forward validation has the flexibility to restart either validating
transaction or active transactions.
This paper introduces the optimistic approach where two phase validation, multiversion
dynamic adjustment of serialization order, and timeout control are implemented along with
this technique for POMS in a WLAN environment. This approach aims to overcome the
issues of late conflict detection and wasted transaction restarts. The multiversion dynamic
adjustment of serialization order is introduced to reduce the occurrence of wasted transaction
restarts while implementing the two phase validation approach to detect conflict earlier to
reduce near-to-complete transaction restarts. Transaction validation is performed in two
stages: pre-validation and post-validation where the former perform early conflict detection
while the latter checks for conflict before transaction commit. The implementation of
multiversion dynamic adjustment of serialization order algorithm in these two phases ensures
that conflicting transactions are not restarted immediately. Timeout control is introduced to
tolerate the impact of unreliable wireless connectivity.
This paper is organized as follows. Section 2 reviews some related work. Section 3 describes
an overview P2P protocol. Section 4 reviews the overall design of the concurrency control.
Section 5 describes the proposed approach. Section 6 provides a set of planned test scenarios
while section 7 concludes this paper.
Related work
OCC-DASO (Optimistic Concurrency Control Dynamic Adjustment of Serialization Order)
was proposed by [6] to reduce transaction restarts in real-time databases. Transactions with
serious conflicts are not aborted immediately but are forward validated and backward
validated before aborting or solved with conflict resolution technique. This reduces
transaction aborts for near-to-complete transactions. SODA (Sequential Order with Dynamic
Adjustment) was discussed in [7] to address response time and transaction abort rate in
Mobile P2P databases. SODA implements backward validation where conflicts between
validating transactions and committed transactions are dynamically adjusted instead of
aborted immediately. This approach retrieves required data by hopping through peers then
return result to the initiating peer. Upon successful validation at the server (peer storing the
data), the updated data is committed at the initiating peer.
In [8], the DMVOCC-MDA-2PLV (Distributed Multiversion Optimistic Concurrency
Control with Multiversion Dynamic Adjustment using Two-Phase Local Validation) protocol
was proposed to improve response time of read-only transaction and reduce unnecessary
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 418
transaction restarts in mobile real-time database system. Local pre-validation is performed at
mobile host (client) to backward validate transaction early conflict detection. Transaction
surviving local pre-validation is qualified for local final validation upon transaction
completion. Local final validation is performed at server checking for conflict between
committed transaction and validating transaction since mobile host does not have the latest
data for final validation. Adjustment is made against validating transaction if conflict is
detected and to serialize in preparation for global validation. Global validation checks for
conflicts between validating transaction and active transactions.
Unlike [7] and [8], [9] that adjusts timestamp ordering to reduce unnecessary transaction
restart rate in mobile database system instead of validation interval as discussed in [9],
timestamp interval was implemented in [9] for adjustment. Like [8], partial validation was
implemented to perform part of the validation on client then on server before committing to
the database. The TCOT (Transaction Commit on Timeout) protocol [10] was introduced to
minimize the impact of the unreliable wireless connectivity. Two timeouts values were
introduced execution timeout defines time required for transaction to complete execution
and shipping timeout defines the maximum time required to fetch data from client to server.
If execution timeout control is not modified, upon timeout, the transaction is expected to
complete then sent to server.
The P2P Protocol
The P2P network can be classified as structured and unstructured. Unstructured network is
formed when peers are established arbitrarily. Therefore, when a peer executes search on data
in the P2P overlay network, the query is flooded [7] throughout the network searching for
peers sharing the require data. The data is route back to the initiating peer upon discovery.
However, the query may not find the required data because if the queried is not popular
among peers. It may take longer to search and locate the required data or it may not be found
since most peers do not have it. This situation is worse when the number of peer increases
(most of them do not share the required data). Unlike unstructured P2P network, structured
network [11] maintains DHT (Distributed Hash Table) where nodes are logically organized.
DHT provides an index facility to map the data to the nodes in the network where every node
in the network plays a part. Routing algorithm is introduced to route queries and requests to
the correct node holding the required data. When query is executed, the required data is
searched in DHT then routed to the target peer holding it. An example of structured P2P
network is Chord [11, 12].
With the introduction of structured P2P overlay, query execution does not suffer from issues
such as single point failure and congestion of client-server architecture and unstructured P2P
networks long query time and failure locating unpopular data. When transaction T is
executed by a peer, it is searched in the DHT. Based on the key value, the location of the
required data is located target peer. The required data is referred as replica as it is sent to
the requesting peer. The replica is stored in the local database of the requesting peer. This
approach implements DHT of structured P2P to facilitate the search and retrieval of data if it
is not found in the local database rather than unstructured P2Ps flooding the network for
desired data to reduce network load and communication besides increasing response time of
query.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 419
The Proposed Design
The three phases of conventional optimistic concurrency control read and computation
phase, validation phase, and write and commit phase are divided into four stages where
read phase is separated from computation phase to accommodate the implementation of two
phase validation. The conventional validation phase is split into two phases, pre-validation
and post-validation where the former is implemented at the beginning of the transaction while
the latter before transaction commits.
It involves three stages of validation during pre-validation. The first stage checks if the
ObjectSet (the set of objects to be read by the transaction) is the latest copy. The required
ObjectSet is searched in the local database first. The required ObjectSet is searched in the
network like explained in Section III of this paper if it is not found locally. The ObjectSet is
returned as replica to the requesting transaction T then saved in the local database. The
replica is denoted as ReadSet (). The required ObjectSet is validated if it is found locally
to check whether it is the latest version. This validation requires version information of the
ObjectSet to be sent to the ObjectSet holder (server) for version comparison. If the requesting
transactions version is different from the servers, the latest ObjectSet is sent to the
requesting transaction else a message is sent to the requesting transaction notifying that it has
the latest copy. It is denoted as . This stage is compulsory even for Read-only
transaction. Since read-only transaction only reads ObjectSet but does not make changes to it,
it does not jeopardize the correctness and integrity of the database. Thus, it is carried out
without blocking.
The last two stages are applicable only to update-only transaction. It checks for conflicts
between committed transactions and requesting transaction and active transactions and
requesting transaction. Committed transactions are transactions that have survived the
validation process and are written into the database. These transactions are recorded into the
serialization order or history list. Active transactions refer to transactions that have survived
the pre-validation process and are currently performing computation on the ObjectSet.
Backward validation is implemented to the second stage of validation. It checks for conflicts
between requesting transaction and committed transactions. There is only one restart
candidate requesting transaction in this stage because committed transactions have
committed while requesting transaction is checking if it is committable. After surviving the
second stage of validation, the third stage implements forward validation which checks for
conflicts between requesting transaction and active transactions. There are two possible
restart candidates active transactions and requesting transaction because both transactions
are not committed. However, requesting transaction is likelier to get restarted because it has
not performed changes on its ObjectSet compared to active transactions. During the pre-
validation process, the assumption that all contents of will be updated is made. Thus,
validation is preformed based on it.
Upon passing the pre-validation process, the requesting transaction is registered to the
active transaction list where it is allowed to begin its computation on the ObjectSet.
Computation phase creates WriteSet where it is submitted for post-validation before
committing to the database. The backward validation and forward validation is applied to
check for conflicts. For both backward validation and forward validation of pre-validation
and post-validation process, the multiversion dynamic adjustment of serialization order
algorithm is applied to detect and resolve conflicts. This algorithm reduces transaction restart
rate by not aborting conflicting transaction but attempts to adjust serialization order to fit the
conflicting transaction into the correct order. Transaction is restarted only when it is unable to
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 420
be adjusted. After passing post-validation, the validating transaction becomes committing
transaction while waiting to be committed to the database. A new version of the objects
within the ObjectSet is created without overwriting the existing ObjectSet. It then updates the
object version list where the next read operation retrieves the latest object version (entry).
Since it is likely for peers to leave and join the network and wireless connection suffers
from frequent disconnection and distortion (unreliable wireless connection), transactions are
likely to get aborted due to the atomicity requirement (ACID properties). The timeout control
is introduced to distinguish disconnection from distortion. Besides, it is implemented to
determine the completion time of the transaction. There are two definitions for timeout
control: execution timeout and shipping timeout. Execution timeout defines the boundary
where transaction must complete before it expires. Upon expiration, the transaction is
submitted to the next phase. Shipping timeout defines the intervals transaction required to send
its data from one peer to another. If it fails to complete within the defined intervals, the
transaction is aborted.
Read/Write Processing
In order to implement the multiversion dynamic adjustment of serialization order algorithm
and timeout control, timestamp is introduced. It is implemented into serialization order to
detect conflict and adjust dynamically. Therefore, each transaction
is associated with a
timestamp denoted as _
issues
and
where
, its content
is return to
since this is the most recent version. The Read timestamp of the data version is
updated to (
) where
. For
, a new
version is created if _
>
else
){
update(
) to (
)
}
//write transaction
if(_
>
|| (
)){
create new version of OS
set Write timestamp of new version of OS to
set Read timestamp of new version of OS to (
)
update OS version list
} else{
if(adjustable by multiversion dynamic adjustment of
serialization order){
create new version of OS
set Write timestamp of new version of OS to
set Read timestamp of new version of OS to (
)
update OS version list
}else{
restart
}}
Figure 1 Read/write processing algorithm
Two separate lists are kept to manage transactions: serialization order list and active
transaction list. The serialization order list is introduced to maintain committed transaction,
which includes read-only transaction, update-only transaction, and write-only transaction.
The active transaction list is introduced to monitor active transactions. There are three types
of update-only transaction. The first type is the requesting transaction which is being pre-
validated which is not maintained in any lists. It is maintained by the active transaction list
after surviving pre-validation. When it has completed its computation, it is submitted for
post-validation. It is added to the serialization order list if it survived while removed from the
active transaction list even if it failed. These lists are implemented to support the multiversion
dynamic adjustment of serialization order algorithm which performs dynamic adjustments to
conflicting transactions.
Multiversion Dynamic Adjustment of Serialization Orde
When conflicts are detected during validation, the conflicting transactions are not restarted
immediately but the serialization order is dynamically adjusted. In order to apply the
multiversion dynamic adjustment of serialization order algorithm, serialization order (SO) of
committed transactions and active transaction is kept and maintained as<
1
,
2
,
3
, ,
>.
There are two possible types of data conflicts which can be induced by serialization order:
Read-Write conflict and Write-Read conflict. There is no Write-Write conflict with the
implementation of multiversioning approach because new version is created for every
successful write operation. Assuming transaction
, the
adjustments are like below.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 422
Read-Write conflict, RS(T
i
) WS(T
j
)
This conflict can be resolved by adjusting the serialization order between T
i
and T
j
such that T
i
T
j
so that the read of T
i
is not affected by the write of T
j
.
Write-Read conflict, WS(T
i
) RS(T
j
)
This conflict can be resolved by adjusting the serialization order between T
i
and T
j
such that T
j
T
j
.
Based on the above adjustments, the adjustment of conflicting transactions can be further
derived as
serialized before
or
serialized before
. For each
adjustment, one of the two criteria must meet. This is illustrated in Figure 2 and Figure 3.
For read-write conflict, RS(T
i
) WS(T
j
) where RST
i
< WS(T
j
)
For write-read conflict, WS(T
i
) RS(T
j
) where , WST
i
< RS(T
j
)
Figure 2 -
is serialized before
For read-write conflict, RS(T
i
) WS(T
j
) where RST
i
> WS(T
j
)
For write-read conflict, WS(T
i
) RS(T
j
) where , WST
i
> RS(T
j
)
Figure 3 -
is serialized before
These definitions are applied to search for Upper Bound (UB) and Lower Bound (LB) in the
serialization order. The serialization order can be dynamically adjusted which is categorized
as simple case and complex case. If the validating transaction VT can be inserted into the
serialization order without dynamically adjusting the order, it is denoted simple case. The
serialization order is dynamically adjusted before restarting if it cannot be inserted into the
serialization order. Assuming the validating transaction
1
,
2
,
3
, , , ,
, , ,
= (1)
Bayes theorem states:
) (
) ( ) | (
) | (
A P
B P B A P
A B P = (2)
Using Bayes Theorem, the equation (1) can be written:
) ... , (
) ( ) | ... , (
max arg
2 1
2 1
n
j j n
V v
MAP
a a a P
v P v a a a P
V
j
= (3)
P (a1, a2 ... an) value is constant for all vj so that this equation can be written as follows:
) ( ) | ... , ( max arg
2 1 j j n
V v
MAP
v P v a a a P V
j
= (4)
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 742
The degree of difficulty to calculate P (a1, a2 ... an | vj) becomes high because the number of
terms P (a1, a2 ... an | vj) can be quite large. This is due to the number of terms are equal to
the sum of all combinations of positions multiplied by the number of categories of words
Naive Bayes Classfier simplify this by assuming that within each category, each word
independent of one another. In other words:
) | ( ) | ... , (
2 1 j i i j n
v a P v a a a P [ = (5)
Substitution of this equation by equation 4 will yield:
) | ( ) ( max arg
1 j i j
V v
MAP
v a P v P V
j
[ =
(6)
P (vj) and the probability of word wk for each category P (wk | v) was calculated during the
training
P(v
j
)
| |
| |
tegory numberofca
category
j
(7)
| |
1
) | (
Vocabulary n
n
v w P
k
j k
+
+
= (8)
Where | kategorij | is the number of words in category j and | examples | is the number of
documents used in training. While nk is the number of times the word wk in category vj, n is
the number of all words in the category and vj | vocabulary | is the number of unique words
(distinc) on all training data.
Naive Bayes is one of the methods used for classification. Naive Bayes uses probability
theory as the basic theory. There are two stages in the process of text classification. The first
stage is the training of the title of the book examples (training example).
The second step is the process of classification of documents of unknown category.
Stages of the process of classification of books using a Naive Bayes:
1. From the data had been entered only book titles, synopsis and language which are then
processed using a Naive Bayes
2. Titles of books and synopses will be processed into pieces called word tokenizing process.
Example :
Titles : Algoritma dan Pemrograman
Synopses : Buku ini membahas bagaimana mengimplementasikan algoritma
dalam bahasa PASCAL dan C.
Tokenizing : |Algoritma| |dan| |Pemrograman|
|Buku| |ini| |membahas| |bagaimana| |mengimplementasikan|
|algoritma| |dalam| |bahasa| |PASCAL| |dan| |C|
3. Refineries data filtering process is a stopword (unnecessary words) and keywords
(important words).
Example :
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 743
Tokenizing : |Algoritma| |dan| |Pemrograman|
|Buku| |ini| |membahas| |bagaimana| |mengimplementasikan|
|algoritma| |dalam| |bahasa| |PASCAL| |dan| |C|
Stopword : dan (the words had been entered on the table as a liaison stopword,
questions, punctuation, etc. will not be processed)
Keyword : Algoritma, Pemrograman, Buku, Algoritma, Bahasa, Pascal, C
(important words to be processed on stage stemming)
4. Stemming process is the management of keywords into a keyword that is by eliminating
additive intact.
Keyword : Algoritma, Pemrograman, Buku, Algoritma, Bahasa, Pascal, C
Stemming : Algoritma Algoritma
Pemrograman Program (eliminating additive)
Buku Buku
Algoritma Algoritma
Bahasa Bahasa
Pascal Pascal
C C
5. Tagging is the process of managing words or keywords that are English.
6. Analyzing process of categorization stage there are two stages
The first phase of the training data or sample data on manual processes including
tokenizing process, filtering, stemming, tagging and Other categories election.
The second stage is stage categorization using Naive Bayes method:
[
e
=
positions i
j k j
V v
MB
v w P v P V
j
) | ( ) ( max arg
3.1 Learn_Naive_Bayes_Text(Examples,V)
Initial state : Examples and v is ready to be processed. Examples is a collection of text
documents that had been determined that the target value as possible.
fs: learning outcomes of probability terms P (wk | v) showed the probabilities P (VJ). P
(wk | v) indicates the probability of occurrence of the word wk in a document class VJ)
/ / Set of all words, the token that appears in
/ / Examples
Vocabulary collection of all the different words and other tokens that appear in
documents from Examples
/ / Calculate P (vj) and P (wk | v)
for each target value v
j
in v do
category
j
subset of examples that target value vj
P(v
j
)
| |
| |
tegory numberofca
category
j
n number of words in keywordj
for each word w
k
in vocabulary do
n
k
frequency of occurrence in categoryj
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 744
P(w
k
|v
j
)
| |
| 1 |
vocabulary n
n
k
+
+
3.2 Classify_Naive_Bayes target value
Calculate the target value for the document stating keyword.wk keywords found in the
position to the j on the keywords that generated from training data.
Positions all positions on keywords found in the vocabulary
[
e
=
positions i
j k j
V v
MB
v w P v P V
j
) | ( ) ( max arg
MB
V
Table 1. Data Sample
Test Data:
Three documents containing the word : Algoritma (2), Program (1), Buku (1), Bahasa (1),
Pascal (1), C (1) 7
Table 2 Examples of Probabilistic Data
V P(Vj)
P(Wk|Vj)
Komputer Aplikasi Program Network TCP/IP
Komputer
Program
1/2 1/15 1/15 5/15 1/15 1/15
Komputer
Network
1/2 1/10 1/10 1/10 1/10 1/10
Results of Probabilistic above is:
Category 1: 1 / 2 * 1 / 15 * 1 / 15 * 5 / 15 * 1 / 15 * 1 / 15 = 0.00000652
Category 2: 1 / 2 * 1 / 12 * 1 / 10 * 1 / 10 * 1 / 10 * 1 / 10 = 0.000005
So to find test third data categorization is to find a higher chance of probabilistic results.
Then the appropriate category for third data test is Komputer Pemrograman.
4. Conclusion
Implementing this text mining application for automatic book classification will process raw
data in the form of text databases that is input title and synopsis of book. Preprocessing will
do tokenizing, filtering, stemming, tagging, and analyzing to the words in this book title so
obtain the keywords. From the keywords, frequent itemset can be generated using Nave
Bayes method to classification of books category.
In the result of naive Bayes method experiment can be used to classification of books
category, looking for the probability many more that is exactly title and synopsis book consist
of the keywords in the training data. By using the keywords can be obtained book title
information that searched by user in the search engine.
No
Keyword (Number of
Keyword)
Category
Books
1
Komputer(2), Aplikasi(4),
Program(4)
Komputer
Program
2 network(2), TCP/IP(1)
Komputer
network
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 745
5. Bibliography
[1] Graham, Paul, (2003), "Better Bayesian filtering",
http://www.paulgraham.com/better.html
[2] Han, Jiawei and Kamber M., (2001), "Data Mining : Concepts and Techniques",
Academic Press, USA.
[3] Tan, Pang-Ning, et al (2006), Introduction To Data Mining , Boston, Pearson
Education
[4] (March 27, 2009), http://en.wikipedia.org/wiki/Stopword
[5] (March 27, 2009), http://www.perseus.tufts.edu/
[6] (June 4, 2009), http://www.tartarus.org/~martin/PorterStemmer
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 746
E-GOVERNMENT: POTENTIAL FOR REGIONAL ACTUALIZATION ERA
INFORMATION AND COMMUNICATION TECHNOLOGY
Ony Widilestariningtyas, Hery Dwi Yulianto
University Computer Indonesia
onykulestari@yahoo.com, denderpete@yahoo.com
Abstract
Era of information and communication technology is now increasingly felt the real
environment of both central government and local government. ICT as a tool for the
government to provide information services that can be accessed by the public to know the
development of public services and potential areas for local government. This is the
realization that Indonesia has been implementing e-government. This paper describes the
implementation of e-government in providing information and communications potential of
the region from all sectors of the region throughout the territory of the Republic of Indonesia.
E government research describes the implementation of ICT as a tool for local governments
to record local potentials at the territory of Republic of Indonesia. So this research could
provide benefits for local governments to register all the existing potentials in the region.
Keywords: e-government, regional potential, information technology and communications.
1. Preliminary
Information and Communication Technology is a breakthrough technology in the 21st
century with the advent of this technology as a thin partition between the nation and
we are increasingly able to communicate and share information with foreign nations
in just seconds. This technology would be optimized if the basic develop supported by
good information system and adequate technology.
Developing information technology today is the Internet that is used on devices that
do not move the computer or mobile device be it a laptop or mobile phone. With these
technological developments spurred an area for the race to develop the potential of
information region owned both potential areas of forestry sector, mining, marine,
fisheries, animal husbandry, agriculture, and several other strategic sectors.
Utilization of this technology can accelerate a growing area by describing or
promoting the wealth owned using this technology.
Potential areas is an asset owned by an area and allows the potential for these areas
are experiencing rapid growth or slow, the potential areas that could have grown
rapidly if there are investors who are willing to invest capital and management. In this
case we will give you the view that the role of information and communication
technology can improve the quality of local potentials. And the current government as
the main organizer regions did not rule out involvement of private parties to manage
the potential of the region together.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 747
2. Goal
a. Utilizing information and communication technology to support local
potentials.
b. Stimulate governments and communities to promote the potential of the region
by utilizing information technology and communications.
3. Reader Review
Definition of E-Government [3]:
Is the use of information technologies that can improve the relationship between the
Government and other parties. Use of this information technology and generate new
forms of relationships such as: G2C (Government to Citizen), G2B (Government to
Business Enterprises) and G2G (inter-agency relationship).
Based on the above definitions of e-government is a form of implementation of new
forms of relationships such as the implementation of G2C, G2B and G2G.
Another definition of E-Government [4]:
E-Government is also called e-gov, digital government, online government or in the
specific context of transformational government implementation is the use of
information technology by government to provide information and services for
citizens, business affairs, as well as other matters pertaining to government.
While the definition above e gov is use of information technology for public servants
with regard to the implementation of government work.
Potential areas are all of the potential that exists in an area that can be utilized by the
state or local area for the welfare of the community. The potential of this area covers
the entire asset or wealth of natural resources, human resources, sources of intellectual
capital and other resources.
Potential areas in the territory of the Republic of Indonesia in the form of natural
resources, agriculture, fisheries, tourism, education, human resources, intellectual
capital, and others.
4. Discussion
a. The role of the Information and Communication Technology
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 748
User
User
Provider
Server
Daerah dan pemerintahan
Figure 1. Role of Information And Communication Technology
Role of Information and Communication Technology in the picture above is
the complexity of the use of information technology and communication
technology is not moving like computers and mobile technology devices such
as Mobile or a laptop.
b. The role of the government and the community in utilizing information and
communication technology.
Figure 3. Benefits of technology
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 749
Prospective actualization can be expressed in a variety of other inter:
o Provision of information sources which are often used by people who shaped
the government offices, educational sites and facilities, tourist attractions and
many others.
o Provision of information resources that can invite investors to invest capital
and management.
o Provision of information on projects will be carried on the government thus
stimulating people to participate and build the potential of the area.
o Services 24-hour online, so that the community needs that are urgent can be
handled.
o Improving the relationship between government, business, and the general
public. Openness (transparency), it is expected that the relationship between
the various parties to be better. This openness eliminates mutual suspicions
and resentment of all these parties.
5. Conclusion
a. The role of communication and information technology is supporting actualize
local potentials, especially the potential area that has not lifted.
b. The role of government and community is an important milestone to actualize
the potential area by utilizing information and communication technology,
thus the potential for this hidden areas become raised.
Bibliography
1. http://id.wikipedia.org/wiki/Teknologi_Informasi_Komunikasi,
In visit 30 April 2010
2. http://rifaiza.wordpress.com/2007/08/15/definisi-dan-manfaat-utama-e-
government/, In visit 30 April 2010
3. http://www.cert.or.id/~budi/articles/e-gov-makassar.doc, In visit 30 April 2010
4. http://e-pemerintah.com/, In visit 30 April 2010
5. http://www.eastjava.com/, In visit 30 April 2010
6. http://potensidaerah.ugm.ac.id/, In visit 30 April 2010
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 750
PERSEPSI PELAJAR TERHADAP PENGINTEGRASIAN KEMAHIRAN BAHASA
ARAB DENGAN MULTIMEDIA
Muhammad Haron Husaini, Mohamad Rofian b Ismail , Mohammad Imran b Ahmad,
Ghazali b Zainuddin dan Normah bt Husin
Fakulti Bahasa Moden dan Komunikasi, Kolej Universiti Islam Antarabangsa Selangor
muhdharon@kuis.edu.my, mohdrofian@kuis.edu.my, imranahmad@kuis.edu.my,
ghazali@kuis.edu.my, normah@kuis.edu.my
Abstrak
Kajian ini menganalisis persepsi pelajar bahasa Arab terhadap kepentingan dan nilai
komersial pengintegrasian kemahiran bahasa Arab dengan multimedia. Penyelidik
menggunakan kaedah kajian lapangan yang melibatkan 87 orang responden dari Pusat
Matrikulasi Universiti Islam Antarabangasa Malaysia (UIAM), Nilai Negeri Sembilan dan
Kolej Universiti Islam Antarabangsa Selangor (KUIS). Kajian mendapati, sebanyak 87.3%
pelajar bersetuju dengan pengintegrasian bahasa Arab dan multimedia kerana pengintegrasian
tersebut mempunyai kepentingan yang signifikan dan nilai komersial yang tersendiri. Melalui
pengintegrasian bahasa Arab dan multimedia, sebanyak 83.9% pelajar mempunyai keyakinan
yang tinggi terhadap prospek kerjaya dalam bidang ini pada masa hadapan. Majoriti pelajar
iaitu 90.8% berpandangan bahawa penggunaan multimedia dalam pendidikan bahasa Arab
akan menjadikan proses P&P lebih efektif dan interaktif. Didapati bahawa sebanyak 85.7%
pelajar berminat untuk mendalami dan menghasilkan bahan multimedia berbahasa Arab.
Sebagai rumusan, penyelidik mempunyai pandangan yang positif terhadap pengintegrasian
bahasa Arab dan multimedia berdasarkan dapatan kajian yang telah diperolehi dan kajian ini
perlu diteruskan dengan kajian-kajian susulan.
Kata Kunci: Persepsi, Pelajar, Integrasi, Bahasa Arab dan Multimedia
1. Pendahuluan
1.1 Objektif Kajian
Objektif kajian antara lain dapat digariskan sebagai:
1. Mengkaji kepentingan dan nilai komersial pengintegrasian kemahiran Bahasa Arab
dengan multimedia.
2. Menganalisis sejauhmana keyakinan pelajar terhadap prospek kerjaya dalam bidang
Bahasa Arab dengan multimedia.
3. Mengenalpasti penggunaan multimedia dalam proses pengajaran dan pembelajaran
akan lebih efektif dan interaktif.
4. Menjelaskan sejauhmana minat pelajar terhadap pengintegrasian kemahiran Bahasa
Arab dengan multimedia.
1.2 Soalan Kajian
Kajian akan memastikan persoalan berikut terjawab:
1. Apakah kepentingan dan nilai komersial pengintegrasian kemahiran Bahasa Arab
dengan multimedia?
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 751
2. Sejauhmana keyakinan pelajar terhadap prospek kerjaya dalam bidang Bahasa Arab
dengan multimedia?
3. Adakah penggunaan multimedia dalam proses pengajaran dan pembelajaran akan
lebih efektif dan interaktif?
4. Sejauhmana minat pelajar terhadap pengintegrasian kemahiran Bahasa Arab dengan
multimedia?
2. Latar Belakang Kajian
Terdapat beberapa kajian yang dibuat oleh para penyelidik menyentuh tentang kepentingan
multimedia dan teknologi maklumat dalam melicinkan proses pengajaran dan pembelajaran.
Antaranya ialah kajian Janudin Sardi dan Mohd Zaki Abdul Rahman (2009:195-207) yang
menyorot perkembangan teknologi maklumat dan komunikasi semasa turut memberi impak
yang besar dalam perkembangan pengajaran dan pembelajaran Bahasa Arab. Pendekatan
terkini memperlihatkan teknologi multimedia digunakan dalam menghasilkan perisian kursus
yang lebih kreatif dan menarik. Dengan mengambil contoh Aplikasi Multimedia Mursyidi,
kajian menyelusuri proses pembangunan sebuah aplikasi multimedia berasaskan web yang
dihasilkan untuk meningkatkan pemerolehan pelajar dalam menguasai nahu Bahasa Arab.
Objektif utama kajian ini ialah mengaplikasikan penggunaan teknologi multimedia
berasaskan web dalam pengajaran dan pembelajaran bahasa Arab, menghasilkan model
pembangunan aplikasi bahasa Arab dalam konteks e-pembelajaran, mengenal pasti kaedah
pembangunan aplikasi berasaskan aksara Arab dan membangunkan perisian kursus nahu
dalam Bahasa Arab Komunikasi.
Antara persoalan yang diutarakan dalam kajian tersebut adalah bagaimana penggunaan
teknologi multimedia diaplikasi dalam pengajaran dan pembelajaran bahasa Arab?, apakah
yang dihasilkan dalam pembangunan aplikasi bahasa Arab?, apakah tujuan pembangunan
aplikasi berasaskan aksara Arab dan apakah perisian yang hendak dibangunkan dalam Bahasa
Arab Komunikasi?.
Untuk mencapai objektif kajian, pengkaji menggunakan kaedah kajian perpustakaan dan
kajian lapangan. Kaedah kajian perpustakaan digunakan untuk mengkaji sumber-sumber tiga
bidang utama dalam kajian ini, iaitu nahu BAK, teknologi multimedia dan reka bentuk
instruksi. Semasa proses pembangunan, kaedah ini juga digunakan semasa fasa analisis dan
fasa reka bentuk, selain sumber-sumber tinjauan kajian berkaitan di peringkat awal kajian
menggunakan kaedah ini.
Hasil kajian menunjukkan beberapa kelebihan aplikasi dapat dikenalpasti, antaranya
fleksibiliti pengguna dalam mengakses aplikasi, tarikan pembelajaran yang menarik melalui
persembahan elemen multimedia seperti grafik, animasi dan audio, di samping pengguna juga
mudah menerokai semua pautan dalam aplikasi. Oleh itu, produk yang dihasilkan melalui
kajian ini merupakan contoh kepada salah satu pendekatan pembelajaran bahasa Arab yang
terkini.
Kajian Mohd Azidan B Abdul Jabar (2009: 221-230) pula mengakui kepantasan
perkembangan teknologi komunikasi dan multimedia pada alaf baharu ini turut
melampiaskan kesannya kepada bidang pendidikan secara umumnya serta pengajaran dan
pembelajaran bahasa asing khususnya. Penggunaan teknologi pendidikan dalam pengajaran
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 752
bahasa asing mampu menseimbangkan kandungan pengajaran bahasa dengan kaedah
penyampaian dan penggunaan bahasa dalam konteks moden hari ini. Dalam erti kata lain,
penggunaan teknologi dapat memudahkan pemerolehan dan penguasaan sesuatu bahasa
asing.
Metodologi kajian tersebut adalah berbentuk kajian lapangan berdasarkan soal selidik yang
dijalankan ke atas 20 orang responden yang terlibat dalam pengajaran kursus kemahiran
bahasa asing di Universiti Putra Malaysia.
Penggunaan teknologi pengajaran dalam kelas dan makmal bahasa semasa pembelajaran
kemahiran bahasa asing memberi manfaat kepada pelajar dan pengajar .Penggunaan
teknologi menjana minat pelajar terhadap apa jua yang disampaikan dalam kelas, lebih-lebih
lagi pelajar yang mempunyai kelemahan dalam aspek pengajarn yang tertentu. Penerangan
pengajar disertakan dengan maklumat yang dipaparkan menerusi skrin LCD umpamanya,
dapat mengekalkan konsentrasi pelajar di dalam kelas dan melatih pelajar berfikir dengan
pantas dan terbuka. Dengan bantuan peralatan teknologi, pengajar dapat mempastikan kualiti
setiap penerangan dan maklumat yang disampaikan. Penggunaan teknologi menjadikan
pengajaran kelihatan lebih menarik, ini adalah kerana mempelajari bahasa asing
sememangnya mencabar, jadi pengajar mesti pandai memikat minat pelajar menerusi
penyampaian yang menggunakan pelbagai teknik, kesan bunyi dan warna.
Kesimpulannya, pengajaran dan pembelajaran kemahiran bahasa asing yang menggunakan
peralatan teknologi pengajaran sebenarnya dapat membebaskan pengajar daripada kaedah
pengajaran tradisional yang dikenali sebagai kaedah pengajaran satu hala yang berpusatkan
pengajar.
Azharuddin Sahil dan Bhasah Abu Bakar (2009:71-76) juga telah membuat tinjauan terhadap
pengaruh positif penggunaan video drama dalam pembelajaran agama Islam di kalangan
pelajar sekolah menengah. Sebuah video drama telah dibentuk untuk membantu guru dan
pelajar sekolah menengah dalam proses pemahaman dan penghayatan agama Islam khasnya
puasa.
Kajian tersebut bermula daripada rekabentuk sehinngalah penilaiannya menggunakan kaedah
ADDIE: Analysis, Design, Development, Implementation and Evaluation. Kajian melibatkan
kaji selidik di lapangan yang mana instrument yang digunakan adalah open-ended question.
Instrument ini digunakan untuk melihat pandangan pelajar tentang keberkesanan video drama
yang digunakan untuk mengajar Pendidikan Islam.
Dapatan kajian tersebut menunjukkan secara keseluruhan semua responden bersetuju bahawa
penggunaan teknologi seperti video drama sangat membantu guru dan pelajar tidak sahaja
dari aspek kognitif tetapi juga dari aspek afektif, penghayatan dan pemahaman. Kaedah video
drama di blik darjah boleh meningkatkan pemahaman, psikomotor dan penghayatan pelajar
dan disokong dengan persepsi pelajar yang positif terhadap penggunaan video drama untuk
pembelajaran agama Islam di bilik darjah.
Mohd Arif Ismail dan rakan-rakan (Zamri Mahamod dan Mohamed Amin Embi. (Ed.). 2008 :
26-42) berpandangan bahawa multimedia merupakan gabungan teks, grafik, audio dan video
serta unsur animasi dalam satu perisian komputer. Penggunaan multimedia dalam pendidikan
sudah menjadi satu lumrah dewasa ini. Menggunakan multimedia dalam pendidikan
bermakna kita menggunakan pelbagai media yang merangsang penglihatan dan pendengaran
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 753
untuk menbantu proses P&P. Penggunaan multimedia dalam P&P memberi kelebihan kepada
guru antaranya menyediakan pembelajaran secara aktif, bergambar dan interaktif, menyedia
laluan pelbagai hala yang boleh dikawal sendiri oleh penggun auntuk menyampaikan
maklumat. Penggunaan multimedia menawarkan pelbagai bentuk penyampaian dan
memudahkan perkembangan kemahiran membuat persepsi dan pentafsiran.
Tidak dapat dinafikan, penggunaan multimedia yang meluas dalam subjek-subjek teknikal
telah mula menular ke dalam subjek sains sosial seperti bahasa. Misalnya dalam pelajaran
Bahasa Melayu, penggunaan multimedia mampu meningkatkan minat dan pencapaian pelajar
dan pengajaran guru akan lebih berkesan dan menyeronokkan. Bahan yang biasa digunakan
adalah teks, video dan juga pita audio dan terbaru ialah perisian multimedia dan bahan
berasakan web. Ada di antara bahan ini menggunakan teks seperti pantun, syair, sajak, novel,
drama, cerpen dan sebagainya sebagai asas.
Kesimpulannya ciri-ciri interaktif multimedia yang lebih terbuka dan mesra pengguna akan
menjadi daya penarik kepada pengguna yang terdiri daripada pelbagai peringkat. Kemahiran
menyediakan perisian multimedia akan menjadi aset penting kepada perkembangan teknologi
negara.
Manakala buku suntingan Norazah Mohd Nordin dan Mohamed Amin Embi (2008: 1-11)
pula telah mamaparkan pandangan bahawa ICT merupakan pemudahcara (enabler) dalam
bidang pendidikan. ICT digunakan dalam proses pengajaran dan pembelajaran dan
pengurusan di sekolah. Dalam hal ini, Kementerian Pelajaran Malaysia telah menggariskan
tiga dasar utama ICT dalam pendidikan iaitu literasi ICT yang bermaksud pelajar
memperolehi kemahiran menggunakan kemudahan ICT, peranan dan fungsi ICT dalam
pendidikan sebagai kurikulum dan alat P&P dan penggunaan ICT untuk meningkatkan
produktiviti, kecekapan dan keberkesanan sistem pengurusan. Sebagai contoh, KPM telah
mengambil langkah drastik untuk memperluaskan penggunaan ICT dalam P&P dan
pengurusan sekolah dengan memperkenalkan Projek Pengajaran dan Pembelajaran Sains dan
Matematik dalam Bahasa Inggeris atau nama singkatannya PPSMI. Selain itu, semua sekolah
akan menjadi sekolah bestari menjelang tahun 2010 sebagaimana dalam Program
Pembestarian Sekolah yang bermula pada tahun 2006.
Terdapat tiga pilihan penggunaan teknologi atau ICT; menggunakan teknologi sebagai alat
untuk menganalisis data, menggunakan teknologi untuk menyelesaikan masalah atau model
matematik atau menggunakan teknologi untuk mengintegrasikan matematik dalam konteks.
Teknologi menjimatkan masa dan mebolehkan pelajar mengakses dengan cara baru untuk
meneroka konsep dengan lebih mendalam. Antara cabaran-cabaran dalam pengintegrasian
ICT adalah para guru perlu bersedia untuk melakukan perubahan dalam kepercayaan dan
kaedah pengajaranuntuk inovasi agar proses pengajaran dan pembelajaran lebih
menyeronokkan. Guru perlu mengubah peranan dan belajar bagaimana untuk mengajar
menggunakan alat teknologi baru selain didedahkan dengan pelbagai kursus untuk pelbagai
kemahiran tentang penggunaan ICT dalam pelbagai peringkat dari aspek pengurusan
sehinnga ke aspek profesional. Semua pihak harus bersedia untuk memberi kerjasama
sewajarnya agar pengintegrasian ICT ini dapat dilaksanakan dengan jayanya (Ibid).
3. Analisis Kajian dan Perbincangan
Borang soal selidik melibatkan 2 bahagian iaitu bahagian 1 melibatkan jawapan dalam 5
skala Likert. Melalui bahagian ini, data diproses melalui perisian Statistical Package for
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 754
Social Sciences (SPSS) versi 17. Manakala bahagian 2 melibatkan jawapan secara terbuka.
Secara keseluruhannya, sebanyak 87 borang soal selidik telah dianalisis untuk menentukan
kekerapan dan peratusan bagi setiap item soalan berdasarkan persoalan kajian. Kajian
memperuntukkan 6 item soalan untuk dijawab oleh responden. Berikut dibentangkan hasil
analisis terhadap item-item tersebut berserta perbincangan ringkas bagi setiap item. Dalam
analisis ini, penyelidik menggunakan skala 1 untuk menunjukkan sangat setuju, 2 setuju, 3
tidak pasti, 4 tidak setuju dan 5 sangat tidak setuju.
Jadual 1: Persepsi pelajar bahasa Arab terhadap kepentingan dan nilai komersial
pengintegrasian kemahiran bahasa Arab dengan multimedia
Item Sangat
Setuju
Setuju Tidak
Pasti
Tidak
Setuju
Sangat
Tidak
Setuju
1. Multimedia penting dalam bahasa Arab 60.9% 26.4% 5.7% 3.4% 3.4%
2. Bahasa Arab akan lebih mempunyai
nilai komersial dengan adanya elemen
multimedia
63.2%
24.1%
4.6%
3.4%
3.4%
3. Graduan yang mempunyai kelulusan dalam
bahasa Arab dengan multimedia mempunya
peluang kerjaya yang lebih cerah
58.6%
25.3%
8.0%
2.3%
5.7%
4. Pengajaran & pembelajaran bahasa Arab
akan lebih interaktif dan efektif dengan
penggunaan multimedia
69.0%
21.8%
2.3%
1.1%
5.7%
5. Saya berminat untuk menghasilkan animasi/
video/ merekacipta grafik dan bahan
multimedia interaktif dalam bahasa Arab
40.2%
43.7%
5.7%
6.9%
3.4%
6. Saya berminat mendalami bahasa Arab
dan multimedia
59.8%
27.6%
4.6%
2.3%
5.7%
3.1 Item 1: Multimedia penting dalam bahasa Arab
Jadual di atas menunjukkan bahawa 60.9% responden sangat bersetuju dengan kepentingan
multimedia dalam pengajian bahasa Arab. Dalam pada itu, 26.4% responden bersetuju
dengan persepsi tersebut. Namun hanya segelintir responden tidak pasti iaitu 5.7%, tidak
setuju iaitu 3.4% dan sangat tidak setuju iaitu 3.4%. Memandangkan pelajar pada masa kini
amat mudah untuk mengakses maklumat sama ada melalui internet mahu pun perisian atau
software, maka keperluan multimedia dalam bahasa dilihat mempunyai kepentingan yang
tersendiri. Berdasarkan pengalaman penyelidik, pelajar ada menggunakan perisian flash dan
Microsoft Power Point dalam mempersembahkan tugasan bagi kursus bahasa Arab.
3.2 Item 2: Bahasa Arab akan lebih mempunyai nilai komersial dengan adanya elemen multimedia
Majoriti pelajar sangat bersetuju dengan multimedia merupakan unsur yang boleh
mengkomersialkan bahasa Arab. Mereka mewakili sebanyak 63.2%. 24.1% daripada
responden pula bersetuju. Hanya segelintir responden tidak pasti iaitu 4.6%, tidak setuju iaitu
3.4% dan sangat tidak setuju iaitu 4.6%. Majoriti pelajar mempunyai pandangan yang positif
terhadap pengkomersialan bahasa melalui multimedia. Teknologi pendidikan bahasa yang
semakin berkembang menuntut kepada mereka yang mahir dalam bahasa dan multimedia
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 755
untuk menghasilkan bahan pengajaran dan pembelajaran (P&P) yang terkini. Ini menjadikan
bahasa Arab mampu untuk dipasarkan bukan sahaja di dalam negara, malah di luar negara.
3.3 Item 3: Graduan yang mempunyai kelulusan dalam bahasa Arab dengan multimedia mempunyai
peluang kerjaya yang lebih cerah
Peratusan responden mengenai kenyataan lulusan bahasa Arab dan Multimedia mempunyai
peluang kerjaya yang lebih luas dapat dilihat dengan jelas. Sebanyak 58.6% responden sangat
bersetuju dengan kenyataan tersebut. 25.3% responden lagi bersetuju. Manakala 8%
responden tidak pasti, 2.3% responden tidak bersetuju dan 5.7% sangat tidak bersetuju.
Graduan bahasa Arab di IPT dan IPTS tempatan menghadapi saingan hebat daripada graduan
IPT luar negara dalam meraih peluang pekerjaan. Mereka ini hanya menguasai disiplin ilmu
linguistik, sastera dan pengajaran bahasa sahaja. Justeru, peluang kerjaya hanya terhad
kepada bidang pendidikan, penterjemahan, pelancongan dan kewartawanan semata-mata.
Namun dengan multimedia, mereka mempunyai kelainan dengan graduan bahasa Arab yang
lain, sekaligus membuka dimensi baru dalam dunia prospek kerjaya bahasa Arab.
3.4 Item 4: Pengajaran & pembelajaran bahasa Arab akan lebih interaktif dan efektif dengan
penggunaan multimedia
Majoriti pelajar amat bersetuju dengan penggunaan multimedia dalam pendidikan bahasa
Arab akan menjadikan proses P&P lebih interaktif dan berkesan. Jadual menunjukkan
bahawa 4. 69% sangat bersetuju, 21.8% bersetuju, 2.3% tidak pasti, 1.1% tidak setuju dan
5.7% sangat tidak setuju. Teknik pengajaran secara konvensional seperti penggunaan buku
dan papan putih, menjadikan P&P bahasa kurang interaktif dan efektif. Penggunaan teks
grafik, animasi, audio dan video dalam P&P bahasa amat dituntut dalam dunia pendidikan
bahasa Arab pada kini. Sebagai contoh jika pelajar tidak memahami perkataan atau kaedah
tatabahasa yang diajar, melalui unsur-unsur multimedia tersebut pelajar akan lebih cepat
memahami berbanding dengan cara konvensional seperti merujuk kepada kamus atau buku.
Hasil pembelajaran (Learning Outcome) bahasa Arab dengan menggunakan multimedia akan
menjadikan P&P bahasa Arab akan lebih interaktif dan efektif.
3.5 Item 5: Saya berminat untuk menghasilkan animasi/ video/ merekacipta grafik dan bahan
multimedia interaktif dalam bahasa Arab
Majoriti pelajar berminat untuk menghasilkan bahan multimedia berbahasa Arab iaitu
sebanyak 40.2% sangat berminat dan 43.7% berminat. Manakala 5.7% tidak pasti, 6.9% tidak
berminat dan 3.4% sangat tidak setuju. Industri animasi negara telah mula menampakkan
beberapa kejayaan. Kejayaan ini menjadi sumber inspirasi kepada pelajar bahasa Arab untuk
menghasilkan animasi tempatan berbahasa Arab. Ini sekaligus dapat mempromosikan negara
kepada dunia luar negara terutama negara-negara timur tengah. Dengan perkembangan arus
teknologi, pelajar juga dapat menghasilkan perisian-perisian pendidikan bahasa Arab yang
terkini.
3.6 Item 6: Saya berminat mendalami bahasa Arab dan multimedia
Sebanyak 59.8% responden sangat berminat untuk mendalami bahasa Arab dan multimedia.
Sebanyak 27.6% pula berminat. Manakala 4.6% tidak pasti, 2.3% tidak berminat dan 5.7%
sangat tidak berminat. Keputusan analisis ini menunjukkan persepsi yang sangat positif
terhadap bidang bahasa Arab dan multimedia. Kedua-dua bidang ini merupakan gabungan
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 756
yang diminati oleh majoriti pelajar pada masa kini. Pelajar dapat mendalami ilmu linguistik,
sastera dan pada masa yang sama mereka dapat mendalami bidang multimedia.
4. Dapatan Kajian
Berikut merupakan dapatan kajian yang dapat disimpulkan berdasarkan persoalan kajian:
1. Secara umumnya, sebanyak 87.3% pelajar bersetuju dengan pengintegrasian bahasa
Arab dan multimedia kerana pengintegrasian tersebut mempunyai kepentingan yang
signifikan dan nilai komersial yang tersendiri.
2. Melalui pengintegrasian bahasa Arab dan multimedia, sebanyak 83.9% pelajar
mempunyai keyakinan yang tinggi terhadap prospek kerjaya dalam bidang ini pada
masa hadapan.
3. Majoriti pelajar iaitu 90.8% berpandangan bahawa penggunaan multimedia dalam
pendidikan bahasa Arab akan menjadikan proses P&P lebih efektif dan interaktif.
4. Didapati bahawa 50% pelajar sangat berminat untuk mendalami dan menghasilkan
bahan multimedia berbahasa Arab. Manakala 35.6% pelajar berminat mendalami dan
menghasilkan bahan multimedia berbahasa Arab.
5. Cadangan Kajian
Sebagai kesimpulan, penyelidik mempunyai pandangan yang optimis terhadap
pengintegrasian bahasa Arab dan multimedia berdasarkan dapatan kajian yang telah
dibincangkan. Namun, skop kajian ini perlu diperluaskan dan disusuli dengan kajian-kajian
lanjutan yang melibatkan pelbagai pihak bagi merealisasikan pengintegrasian ini, sekaligus
dapat memperkasa pendidikan bahasa Arab khususnya dan multimedia umumnya.
6. Rujukan
Azharuddin Sahil dan Bhasah Abu Bakar. (2009). Kesan Penggunaan Video Drama Terhadap
Peningkatan Penghayatan Pelajar, Prosiding Seminar Kebangsaan Teknologi Dan
Inovasi PengajaranPembelajaran: 71-76. Putrajaya: Hotel Palm Garden IOI Resort.
Janudin Sardi dan Mohd Zaki Abdul Rahman. (2009). Aplikasi Multimedia Mursyidi:
Pendekatan Pembelajaran Bahasa Arab Dalam Talian, Prosiding Seminar Kebangsaan
Teknologi Dan Inovasi PengajaranPembelajaran: 195-207. Putrajaya: Hotel Palm
Garden IOI Resort.
Mohd Azidan B Abdul Jabar. (2009). Faedah Teknologi Pengajaran, dalam Pembelajaran
Kemahiran Bahasa Asing. Prosiding Seminar Kebangsaan Teknologi Dan Inovasi
PengajaranPembelajaran: 221-230. Putrajaya: Hotel Palm Garden IOI Resort.
Norazah Mohd Nordin dan Mohamed Amin Embi. (Ed.). (2008). Pengintegrasian ICT
Dalam Pendidikan Penyelidikan, Amalan Dan Aplikasi. Shah Alam: Karisma
Publication Sdn. Bhd.
Zamri Mahamod dan Mohamed Amin Embi. (Ed.). 2008. Teknologi Maklumat Dan
Komunikasi Dalam Pengajaran Dan Pembelajaran Bahasa Melayu. Shah Alam:
Karisma Publication Sdn. Bhd.
Proceedings of Regional Conference on Knowledge Integration in ICT 2010 757
7. Lampiran
Berikut adalah pandangan responden yang kurang bersetuju terhadap pengintegrasian
kemahiran Bahasa Arab dengan multimedia:
1. Kurang pasti pengintegrasian kemahiran bahasa Arab dengan multimedia kerana
masih belum mendalami bahasa Arab dengan baik.
2. Saya tidak yakin tentang pengintegrasian kemahiran bahasa Arab dengan multimedia
kerana asas dalam bahasa Arab masih lagi belum cukup kuat. Saya memerlukan lebih
masa untuk mempelajari bahasa Arab.
3. Asas bahasa Arab saya lemah, akan tetapi saya merasakan untuk zaman sekarang
teknologi amatlah penting dan pengintegrasian kemahiran bahasa Arab dengan
multimedia adalah idea yang bernas.
4. Saya mungkin akan menerima pengintegrasian kemahiran bahasa Arab dengan
multimedia kerana ia boleh menambahkan pengalaman dan ilmu saya.
http://www.kuis.edu.my/ictconf/
Please visit the website to download the digital copy of all the
proceedings. Thank you very much for the contributions.