i A PROTOTYPE TO EVALUATE INFORMATION SECURITY AWARENESS LEVEL FOR TEACHER AND STUDENT IN SECONDARY SCHOOL NURUL HIDAYAH BT AB RAHMAN UNIVERSITI TEKNOLOGI MALAYSIA A PROTOTYPE TO EVALUATE INFORMATION SECURITY AWARENESS LEVEL FOR TEACHER AND STUDENT IN SECONDARY SCHOOL NURUL HIDAYAH BT AB RAHMAN A dissertation submitted in partial fulfillment of the requirements for the award of the degree of Master of Computer Science (Information Security) Faculty of Computer Science and Information System Universiti Teknologi Malaysia NOV 2009 iii Dedicated to Nadim and Eti iv ACKNOWLEDGEMENT In preparing this thesis, I received guidance and encouragement from my supervisor, Dr Rabiah Ahmad, without whom I might not be able to complete this thesis. I extended my appreciation to all of my family, colleagues and others who have provided assistance and support. To SMKTTDI staff and student who are willing to participate during user testing. May Allah bless all of us. v ABSTRACT This study attempted to develop a prototype to evaluate information security awareness level for teacher and student in secondary school. It identifies the information security awareness level by measure the level using an assessment model and automated tool. The assessment model for this study is Affect, Behavior, Cognitive (ABC) model from social cognitive theory where it equals with three dimensions which are attitude, behavior, and knowledge that have been used as measurement component for this study. The methodology for the whole study is System Development Life Cycle (SDLC) by applying waterfall model. The awareness level is evaluated based on the three dimensions from five focus areas for each teacher and student category. The user testing has been done among some teachers and students to test the prototype. As a result, all of the prototype function are working properly and able to produce the expected output. It shows that the prototype can be implemented in real world with some improvement for better result. vi ABSTRAK Kajian ini dilakukan untuk membina prototaip bagi menilai tahap kesedaran maklumat di kalangan guru dan pelajar sekolah menengah. Ia menilai tahap kesedaran keselamatan maklumat dengan mengukurnya menggunakan model penilaian. Model penilaian untuk kajian ini adalah ABC model, dari teori kognitif sosial. Model berkenaan bersamaan dengan tiga dimensi iaitu pengetahuan, kelakuan dan tingkah laku yang digunakan sebagai komponen pengukur untuk kajian ini. Metodologi untuk kajian ini adalah Kitar Hayat Pembangunan Sistem dengan mengaplikasikan model waterfall. Tahap kesedaran dinilai menggunakan tiga dimensi tersebut berpandukan lima topik utama untuk setiap kategori guru dan pelajar. Ujian pengguna telah dijalankan untuk mengenalpasti kebolehfungsian prototaip ini. Hasilnya, ia berjaya berfungsi seperti yang dirancang dan mengeluarkan output yang dikehendaki. Ini menunjukkan prototaip ini boleh dilaksanakan dengan sedikit penambahbaikan untuk menghasilkan produk dan keputusan yang lebih baik. vii TABLE OF CONTENTS TITLE CHAPTER 1 2 PAGE DECLARATION ii DEDICATION iii ACKNOWLEDGEMENT iv ABSTRACT v ABSTRAK vi TABLE OF CONTENT vii LIST OF TABLES x LIST OF FIGURES xi LIST OF ABBREVIATIONS xii LIST OF APPENDICES xiii INTRODUCTION 1 1.1 Overview 1 1.2 Problem Background 1 1.3 Problem Statements 3 1.4 Project Objectives 3 1.5 Project Scope 4 1.6 Project Summary 4 LITERATURE REVIEW 5 2.1 Introduction 5 2.2 Information Security 5 2.3 Information Security Awareness 7 2.4 Information Security Awareness for Student and Teacher 9 2.5 Affect, Behavior, Cognitive (ABC) Model 12 viii 2.6 2.7 3 6 16 18 3.1 Introduction 18 3.2 Methodology 18 3.2.1 Feasibility Study 19 3.2.2 Analysis 21 3.2.3 Design 26 3.2.4 Implementation 28 3.2.4.1 Hardware Requirement 28 3.2.4.2 Software Requirement 29 3.2.5 Testing 29 3.2.6 Maintenance 30 Summary 30 INFORMATION SECURITY AWARENESS FOR TEACHER AND STUDENT TOOL (ISATS) 31 4.1 Introduction 31 4.2 Information Security Awareness For Teacher And Student Tool (ISATS) 31 4.2.1 Admin Login 32 4.2.2 34 4.3 5 Summary 13 METHODOLOGY 3.3 4 Automated Tool to Measure Information Security Awareness Level Teacher Category Survey 4.2.3 Student Category Survey 34 4.2.4 Survey Result 35 4.2.5 Overall Survey Result 37 Summary 39 DISCUSSION 40 5.1 Introduction 40 5.2 Discussion of ISATS 40 5.3 Summary 41 CONCLUSION 42 6.1 Introduction 42 6.2 Limitations 42 6.3 Conclusion Remarks 43 ix 6.4 Future Work REFERENCES APPENDICES A-H 44 45 49-86 x LIST OF TABLES TABLE NO. TITLE PAGE 3.1 The Five Focus Area 22 3.2 The Part of Questions for Password Protection and 24 Management Focus Area (Teacher Category) 3.3 Weights Scale 25 3.4 Awareness Scale 26 xi LIST OF FIGURES FIGURE NO. TITLE PAGE 2.1 ABC Model 13 2.2 Interface of Evaluation Mode 14 2.3 Interface of Online Information Security 15 Awareness for Children 2.4 ASSET Interface 16 3.1 Waterfall Model 19 3.2 Top Internet Main Use (Student) 20 3.3 Top Internet Main Use (Teacher) 21 3.4 The Assessment Model 23 4.1 Login Form 32 4.2 Admin Access Menu 33 4.3 End User Access Menu 33 4.4 Teacher Category Survey 34 4.5 Student Category Survey 35 4.6 Survey Result 35 4.7 Retrieve Survey Result (Student Example) 36 4.8 Retrieve Result (Teacher Category Example) 37 4.9 Overall Survey Result 38 xii LIST OF ABBREVIATION ABC - Affect, Behavior, Cognitive ICT - Information and Communication technology ISATS - Information Security Awareness Level for Teacher and Student Tool SDLC - System Development Life Cycle (SDLC) SMKTTDI - Sekolah Menengah Kebangsaan Taman Tun Dr Ismail xiii LIST OF APPENDICES APPENDIX TITLE PAGE A Gantt Chart 49 B Survey Question 50 C Top Internet Main Use Survey Questions 56 D Entity Relationship Diagram 60 E Context Diagram 61 F Data Flow Diagram 62 G Flowchart 63 H ISATS Source Code 67 CHAPTER 1 INTRODUCTION 1.1 Overview This study is to develop a prototype to evaluate information security awareness level for teacher and student in secondary school. The purpose of the prototype is to identify the level of information security awareness based on assessment model. This chapter describes the problem background of this project, problem statements, objectives, scopes and plans for this project. 1.2 Problem Background Information and Communication Technology (ICT) has rapidly evolved and impacted on all age level. Most youth are ICT literate nowadays and topic like Friendster, MySpace, e-mail, and chatting have became their daily conversation. In 2 addition, most school especially in urban area also provides computer facilities with Internet service provided. Information security is the one of the concern when people use Internet. Particularly, secondary school students are gain exposure to the Internet technology but do they really aware on information security? Are they aware with the terms like Trojan horse, spyware, spamming and so on? Furthermore, do their teachers aware with information security issue? In fact, the level of security awareness among teachers must be addressed as well as they are suitable person to educate students. There are three reasons for information security professional need to aware of people attitude towards information security. As described in Information Security Management Handbook (2007), the three reasons are: i) Behavior predictor – Attitude is a good predictor of behavior. That is the point where survey can be a tool to determine the behavior of target population toward information security issues. The information can be used to predict how secure the environment will be. ii) Target of change - Subtly or directly change someone attitude, consequently change behavior. iii) Source of risk -Extreme attitude toward someone or something can lead to irrational cognitive function and behavior. According to above reasons, survey can be a tool to predict the security of an environment based on user behavior. In Malaysia, there is still no study to identify teacher and student information security awareness level. Research findings by Chai, et.al. in 2006 suggest that students, who have strong self-efficacy toward Information Security on the Internet and have an exposure of information security from school, parents and media, are more likely to practice information security such as updating anti-virus software, not opening emails from unknown senders, and protecting personal information on the Internet. To motivate students’ information security behavior, we need to provide more 3 information security education opportunities to students as well as chances for students to be exposed to information security issues. 1.3 Problem Statements a) There is no proper assessment model to evaluate the information security awareness level for teacher and student in secondary school. b) There is a need to identify teacher and student awareness level to have perception or give idea of their information security awareness level. 1.4 Project Objectives The objectives of this project will be as follows: i) To develop an appropriate model of information security awareness to secondary teacher and student. ii) To develop a prototype to evaluate information security awareness level for teacher and student in secondary school. iii) To identify the level of information security awareness in secondary school teachers and students. 4 1.5 Project Scope The prototype will focus on capture user input for questionnaire answer and generate the outputs as the survey result. The survey result will indicate the awareness level of user. Besides, the prototype will generate the average level of users according to their category. It will be evaluated from their knowledge, behavior, and attitude towards information security. The total of those three dimensions would be their total awareness level. The calculation and scale is based on reviewed previous study. In addition, there is an administrator to monitor and maintain the prototype. Administrator will manage the data of the prototype and only administrator has access to view the overall survey result. The end user only can view their individual result only. 1.6 Summary This project is carried out to develop an automated tool that can identify the information security awareness level so that it can be use to give input for more effective information security awareness program. This chapter highlights the problem background, project objective, problem statement, and project scope. Chapter 2 discusses the related secondary sources with this study like journal, article, and so on. 5 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction In this chapter, some studies and works regarding information security awareness are reviewed. A few similar studies are assessed in order to determine the appropriate operational framework for this study. The Affect, Behavior and Cognitive (ABC) model, a model from social psychology field to assess attitude is discussed to obtain clear view regarding the method that will be used in this study. 2.2 Information Security Information security is not a new thing or issue. It has exists a long time ago before the invention of computer to protect information. Ceasar’s cipher was employed by Julius Caesar on his military campaign in order to safely communicate important messages to his generals (O’Regan, 2008). Dlamini quoted Russel and Gangeni (2008), in the 1840s when the telegraph was invented an encryption code was developed to safeguard the secrecy of the transmitted telegrams. Then, 6 legislation prohibiting wiretapping was applied one year after the invention of telephone. Information security has moved from protecting the secrecy of hand written messages to telegrams, to telephone conversations and later to the world of computing (Dlamini, et. al., 2008). The importance of information protecting has been aware a long time ago and initiates people to think on how to protect information, then invent encryption code and later integrate the code into computer technology. However, with the technology grown, security breaches make it move as well. In the early days, the viruses without causing any serious damage to computer system arouse. Currently, many types of computer security attack and critical damage has occurred make a lot of people scared especially when using online banking or any other online system. Here, information security scope become wider and many organizations take a move to take care about it. According to Thomson and Solms (1998), a great challenge has been brought by the advent of the personal computer, as well as the increasing complexity and reliability of networks, in the area of information security. The challenges as addressed by Thomson and Solms are described below: • The decreasing price and increasing capabilities of personal computers resulted in many people in the organization acquiring these machines. • The ever increasing number of software development packages available made it possible for these people to start developing their own systems. • The knowledge gained from developing these systems could often give them the capability to circumvent security measures built into the current systems. • The ever increasing use of the Internet meant that there were potential threats from outside the organization. 7 It shows that the emergence of technology also give impact in the area of information security. Each type of technology has its own pro and cons like Internet usage can bring user to borderless information searching but at the same also bring borderless virus attack. Internet and computer user is not limited to workers at organization but home users as well. As the result, the attack target become broader where home users can be the victim. IS027001 defined information security is all about protecting and preserving information. It is all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information. Information systems may be secured by preventing, detecting, and correcting internal and external threats (Chen, et. al., 2006). In order to protect and preserve information, it is important to prevent, detect and correct any internal and external threats. Most industries are dependent to Information Technology (IT) technology and infrastructure to store information nowadays. Therefore, all security aspects must be addressed carefully to avoid any security breach or incidents. In addition, end user must have the basic of prevent and detect threats at least. 2.3 Information Security Awareness Attackers have matured from using hacking skills to show that they can circumvent the authentication process to access each other’s files to use them in the theft of confidential information (Dlamini, et al, 2008). Currently, most of our information is reside on electronic database and attract the adversary for social engineering, phishing, identity theft and other white collar crime. If users are not aware with the new type of stealing, they can easily expose their sensitive information and become victim. 8 Today’s security problems are primarily due to the inadequate security awareness of users, which can be mitigated without the need for sophisticated security technologies (Chen, et al., 2006). Human factor plays important factor as well especially to avoid human error factor. For that reason, it is important to create the awareness among user. The term ``information security awareness'' is used to refer to a state where users in an organization are aware of the ideally committed to their security mission (often expressed in end-user security guidelines) (Siponen, 2000). Besides technical computer security issue, information security awareness issue must be focused as well. Although the best security technology has been implemented, it cannot avoid other types of security attack like social engineering. User must really understand and know regarding IT security threats in order to ensure they can react for security incidents properly. A survey for security perception of personal novice Internet at United Kingdom (UK) user shows that 43% claimed not to understand the threats, 38% claimed they did not know how to use security packages, 35% indicated that they did not know how to secure their computer, and 32% indicating that they did not know about the threats (Furnell, Bryant and Phippen, 2007). Besides, it also reveals that 17% had systems that were used by children under 12, whereas 18% had computers that were used by children aged 12–18 (the overall proportion of respondents with children was 30%). With the advent of Internet users, the focus of information security awareness has become broader and not only cover end user at organization. Furnell (2007) also found that the fact that organizations are tightening their defenses leaves home user systems as attractive targets for compromise. As the security aspects whether physical or logical are not really being focused by home user, it leaves vulnerable for them. 9 2.4 Information Security Awareness for Student and Teacher The extra concern must be addressed to user between 12 – 18 years old. The user, obviously school student can be the main target for attacker. This can be explained by the fact that students are typically transient and have less credit history than more established adults (Yacine and Marks, 2008). It is crucial to protect them from exposed to security threat risk and they also need to be aware with information security. A study by Wee (1999) had identified the pattern of Internet use among upper secondary science students from fourteen schools in Kuala Lumpur, Malaysia. According to the study findings, about 51.5 percent of respondent used the Internet and they mainly accessed the Net from their homes and acquired Internet skills by self-teaching or learning from friends. The finding also stated that most of the Net users (91.4 percent) explored the World Wide Web while 75.4 percent used E-mail, 52.1 percent used IRC or ICQ, 15.7 percent joined Newsgroups, 2.2 percent used it for downloading, and 0.6 percent used it for playing online games. From the study on 1999, 51.1% respondent used the Internet and the total can be increased nowadays due to decreased price of personal computer and the ease of Internet access. Furthermore, the study also found that the students gained Internet skills by self teaching or learned from friend and it shows that the school student group might not have proper knowledge on how to use Internet safely. There is probability that they are lack of information security knowledge. In addition, hacking is a growing problem among the teenage community (Zahri and Sharifah Sajidah, 2005). Teenagers have gained interest in terms of computer hacking, software cracking, and Web site defacement. Furthermore, there are a lot of free hacking tool available on the Internet ease their intention without programming knowledge. However, they only look for excitement and do not understand the real implications of their actions. In fact, a group of computer-savvy youth, between 18 and 25 years old had been arrested in Kuala Lumpur after scoring a first of sorts for phishing (Lee Shi-Ian, 2006). 10 School can be a perfect place to educate and make them aware with information security. As described by Hentea (2005), information security awareness has to be provided to students at an earlier age and if we teach children security awareness earlier, they will be prepared to pay attention to security matters as well as to avoid getting engaged in illegal behavior. Student can be less interest on learning information security after they enter higher education as they have learned computer skills. It is more suitable to expose the information security knowledge earlier so that it can be guide for them in future and the knowledge gained parallel with computer skill. Hentea (2005) also suggests that educators and parents must be trained on how to handle information security issues and how to use computers so that they will be better prepared to provide training to youngsters. Teacher is suitable person to deliver the information security knowledge as they have well-trained to educate student. However, teacher must be prepared with the knowledge first. As a result, the information security awareness is important to both teacher and student. Professional Information Security Association (PISA) has conducted a survey of information security at education sector on 2003, in Hong Kong. The results show that most of the schools had some measures on basic security precautions such as installing anti-virus programs (98%) and using web content filtering (78%). But the use of more advanced information security measures was not popular (for example: only 52% use firewall, 9% use intrusion detecting system, etc.). The lack of competency among school personnel contribute to the result. They must be exposed or trained with at least basic information security requirement. A security awareness program at school has been launching at Hyderabad, India by Center for Development of Advanced Computing. The program scopes for student and teacher cover guidelines, information, handbook and quizzes. Besides, National Cyber Security Awareness (NCSA) also executed information security awareness program at 2004 and one of the audiences are education audiences including K-12 and higher education (Hentea, 2005). 11 Those information security awareness programs were focused on nontechnical security issue. The difference between technical and non-technical is technical information security issues focus mainly on the technical-oriented knowledge and tools (such as encryption techniques) that are required to secure and protect information whereas non-technical include all the non-technical-oriented knowledge that is required to secure and protect information and information systems (Kritzinger and Smith, 2008). Most of school teachers and students do not received formal or specialized knowledge in terms of computer security. Therefore, it is proper to measure their non-technical security issues. United States Computer Emergency Readiness Team (US-Cert) listed the non-technical security issues are as follows: i) General security – password, firewall ii) Attacks and threats iii) Email and communication iv) Mobile devices v) Privacy vi) Safe browsing vii) Software and Applications Some countries have implemented the information security awareness program at school. As school students are one of the computer and Internet users nowadays, it is very vital to provide them with the information security knowledge. The knowledge can avoid or reduce them from security threats like social engineering, phishing, and spyware attack. In addition, teachers at school must be prepared as well as they are accountable to educate the students. 12 2.5 Affect, Behavior, Cognitive (ABC) Model Attitude is defined as our positive or negative response to something. For example when people have positive feeling on privacy, automatically they are not willing to give out network password to unauthorized people. On the contrary, if they have negative feeling on privacy, they will be more willing to give password or any confidential information to unauthorized people. One of the most widely assumed models of attitude structure is the tripartite model (Anthony, R.P., 1989; Brecker, 1984; Rosenberg&Hovland, 1960). According to Information Security Management Handbook, ABC model also known as Tripartite model presents attitude as an amalgam of three separate measurable components which are affect, behavior, cognition (refer to Figure 2.1). ABC model stemming originally from the Yale Communication and Attitude Change Program at Yale University through the 1950s and 1960s, but sharing a fundamental viewpoint with many other philosophical traditions (Martha, A. et.al., 2006). The descriptions of the three components are as follows: i) Affect - emotional aspect of our attitude, our feelings toward an object or subject play an important role in determining our attitude. ii) Behavior - derived from the fact that our behavior serves as a feedback mechanism for our attitudes. iii) Cognitive - thoughtful, thinking aspect of our attitude. Opinions toward an object or subject can be developed based widely solely on insightful, process-based thinking. 13 Affect Attitude Behavior Cognitive Figure 2.1: ABC Model (Information Security Management Handbook, 2007) Other researchers have already performed work where the social sciences were related to the field of information security awareness like Schlienger and Teufel (2003) made use of social-cultural measures to define a model for analyzing information security culture in organizations. Besides, Chai, S. et. al. (2006) also applied social cognitive theory in an exploratory study of middle school children’s information security behavior. 2.6 Automated Tool to Measure Information Security Awareness Level A prototype model to measure information security awareness at an international gold mining company has been developed (Kruger and Kearney, 2006). The model makes use of a simple data gathering process and weighting system and, combined with certain multi-criteria problem solution techniques, provides a quantitative measurement of security awareness levels. The study used ABC model as a basis and three equivalent dimensions namely what does a person know (knowledge); how do they feel about the topic (attitude); and what do they do (behavior). 14 Furnell, Gennatou, and Dowland (2002) have developed a prototype tool for information security awareness in training. The tool implemented in Visual Basic (VB), in order to provide interactive and user-friendly approach to enhance user understanding of IT security. The tool comprises three modes of operation which are exploration mode, evaluation mode and author mode. The evaluation mode (refer to Figure 2.2) is similar with this study where the user can test their understanding of security by applying countermeasures to the example scenario. Figure 2.2: Interface of Evaluation Mode Another similar work is the online information security quiz for children developed by Center for Development of Advanced Computing (refer to Figure 2.3). The questions will test the children understanding and generate respond to children answer whether it is true or wrong. The awareness level is measured from the score obtained by answering quiz questions. 15 Figure 2.3: Interface of Online Information Security Awareness for Children (in http://infosecawareness.in/isea/children/quiz-for-children) National Institute of Standard and Technology (NIST) has developed a tool named Automated Security Self Evaluation Tool (ASSET) in 2003. The aim of ASSET is to provide a centralized place for the collection of data used to assess a system. The control objectives and techniques are taken from long-standing requirements found in statute, policy, and guidance on security. ASSET consists of two host-based applications: ASSET – System and ASSET – Manager. The report of ASSET is designed to give clear picture of their resources security status. ASSET – System facilitates the gathering of individual system data and provides a limited reporting capability. It allows the user to determine the completeness of an individual system assessment in progress. ASSET – Manager aggregates individual system assessments created by ASSET – System. It assists managers in developing an organization-wide perspective on the state of IT system security. Figure 2.4 shows the interface of ASSET. 16 Figure 2.4: ASSET Interface 2.7 Summary The reviewed of the term, attitude concept, and previous similar studies have given adequate input to precede this project. Some aspects of the previous study also can be guide for this study such as the issues to be covered in order to examine information security awareness level, research design and the example of system modules. The next chapter will discuss regarding project methodology used to accomplish this study. 17 CHAPTER 3 METHODOLOGY 3.1 Introduction This chapter discusses the proposed methodology in order to develop the prototype to evaluate information security awareness level among teachers and students at secondary school. The identified components from previous chapter will be mapped into the system architecture depending on its functionality and its requirement. 3.3 Methodology System Development Life Cycle (SDLC) is the method that would be used to develop the prototype for this study. SDLC is a conceptual model used in project management that describes the stages involved in an information system development project from an initial feasibility study through maintenance of the completed application. 18 Waterfall model is the methodology of SDLC that would be applied to his study. It takes the fundamental process activities of specification, development, validation and evolution and represents them as separate process phases (Sommerville, 2001). Six phases involved in waterfall model which are feasibility studies, analysis, design, implement, test and maintain. Figure 3.1 presents the schematically view of waterfall model. Figure 3.1: Waterfall Model 3.2.1 Feasibility Study At this stage, the major functions of the intended prototype will be defined. The goals and objective of this project is determined at this phase. The assumption of the project duration is defined using Gantt chart (refer to Appendix A) to ensure the development process going smoothly. Then, the major functions of the intended prototype would be defined. Journals, articles, conference papers and books are reviewed as secondary source for this study. The reviewed sources are from related topic like information security awareness, information security awareness among teacher and student, automated tool to evaluate information security awareness level and social cognitive 19 theory to measure people attitude. All inputs from reviewing secondary source are used to identify component for the prototype. The initial part to concern is what component to measure the information security awareness level among teacher and student. From earlier studies, social cognitive theory is widely used to explain individual behavior. As described in previous chapter, there are some similar studies which use social cognitive theory to measure the level of information security awareness level. The ABC model that comprises three components which are affect, behavior and cognitive is used as the base and the three equivalent dimension from the model was developed namely: i) knowledge - what does a person know ii) attitude - how do they feel about the topic iii) behavior - and what do they Knowledge is equivalent with cognitive, based on ABC model where cognitive means thoughtful or thinking aspect of our attitude. Attitude is equivalent with affect, to show feelings towards a subject or object while there is no change for behavior. This approach has been used by Kruger and Kearney (2006) to develop a measuring information security awareness tool in gold mining company environment. However, this study applies the model in secondary school environment with the teacher and student as end users. 20 3.3.2 Analysis During analysis phase, a detailed study of the prototype needs is carried out. The information from the previous phase is gathered and being analyzed carefully to verify the prototype requirement as identified at feasibility phase. After identified three dimensions to measure information security awareness level, there is a need to identify the focus areas for this study. Non-technical security issue has been chosen as the main focus as most of the end users do not have proper knowledge regarding security term. The lists of non-technical areas from US-CERT as described in Chapter 2 become main reference to identify the focus area. Besides, a survey among 23 teachers and 99 students at Sekolah Menengah Kebangsaan Taman Tun Dr Ismail has been conducted to identify their Internet main uses. The survey question can be referred to Appendix C. The survey result (refer to Figure 3.2 ) indicated that 55.6% of students use Internet for Social Network Sites, 30.4% teachers use Internet for email and 26.1% teachers use for online banking or paying bills (refer to Figure 3.3). Figure 3.2: Top Internet Main Use (Student) 21 Figure 3.3: Top Internet Main Use (Teacher) There is also consideration for hacking problem among teenagers as reviewed earlier. The combination of the reviewed secondary source and survey, five focus areas has been identified for this prototype (refer to Table 3.1). However, the focus areas can be increased or modified in future. Focus Areas Teacher Student i) Password Protection i) Password Protection and and Management Management ii) Email and Internet ii) Virus threats and attack iii) Virus threat and iii) Hacking attack iv) Mobile device and iv) communication v) Identity engineering Email/Internet/Social Network Sites theft/social v) Mobile device communication Table 3.1: The Five Focus Areas and 22 A reviewed papers regarding hacking problem among teenagers is considered and hacking is one of the focus area for student. Meanwhile, the survey result shows that Social Network Sites is the main use of Internet among school student and it is also include as the student’s focus area. The survey result also shows that Internet banking is one of the Internet main uses for teacher, hence there is issue regarding their awareness on social engineering or identity theft. The rest of focus areas are referred to US-CERT list of non-technical issues. Five focus areas for each teacher and student are subdivided from each one of the three dimensions. Tree structure is used to aid in structuring the criteria and forms the assessment model. A tree structure is a way of representing the hierarchical nature of a structure in a graphical form. Figure 3.4 depicts the tree structure developed. From Figure 3.4, it shows that the five focus areas are mapped to each one of the three dimensions. 23 Password protection and management Email and Internet Knowledge Virus threat and attack Teacher Behavior Mobile devices and communication Attitude Identity theft and social engineering Overall Awareness Level Password protection and management Email/Internet/Soci al Network sites Knowledge Virus threat and attack Student Behavior Attitude Mobile devices and communication Hacking Figure 3.4: The Assessment Model 24 Questions that will be asked to end users are representing each focus area in associate dimension. Table 3.2 presents the part of questions for password protection and management focus area for teacher category. The full questions for both categories can be referred to Appendix B. The questionnaire are comes from several sources like from the Purdue University, Center for Education and Research in Information Security (CERIAS), Security Awareness Quiz Question (Melissa, G. 2001) and questionnaire from the University of Florida’s IT Security Team. Those questions were combined and revised based on this study suitability. Focus Area Questions Knowledge Behavior Attitude Password When constructing a Do you use same The best way that you protection password you should: password and A. use sport’s name, different for can online password management pet’s name and add accounts? number at the end. protect A. Always your from disclosure: A. Write it down and B. use phrases or B. Often kept it in secure place misspelled word with C. Rarely without embedded information. character D. Never header and number B. Kept in a computer C. file. use sequenced number and character from keyboard D. All of the above Table 3.2: The Part of Questions for Password Protection and Management Focus Area (Teacher Category) 25 The following weights scale is used to compute the measurement of information security awareness level (refer to Table 3.3). Each question has its own score where when the score is accumulated, it contributes to the total of weighting for each dimension. The scale has been used by Kruger and Kearney (2006) to compute the level of information security awareness level where the weight was determined using the Analytic Hierarchy Process (AHP). Thomas L. Saaty developed the AHP and a good description of the technical details and application possibilities can be found in Saaty (1980) and Vargas (1982). The AHP approach makes use of pair-wise comparisons to provide a subjective evaluation of factors based on management’s professional judgment and opinion. The comparisons are made using a preference scale, which assigns numerical values to different levels of preference. A square matrix is then derived from the pairwise comparisons and a scale is extracted based on the matrix’s eigenvector associated with the largest eigenvalue. When this vector is normalized to sum to one, the solution is unique and represents a numerical measure of the decision maker’s perceptions of the relative importance of criteria. Dimension Weighting Knowledge 30 Attitude 20 Behavior 50 Table 3.3: Weights Scale (Kruger and Kearney, 2006) In addition, Table 3.4 illustrates the awareness scale that will be applied to state their awareness level. 26 Awareness Scale Descriptions 80%-100% Good - satisfactory 79%-60% Average – need to monitor <=59% Poor - unsatisfactory Table 3.4: Awareness Scale (Kruger and Kearney, 2006) 3.3.3 Design Design phase involves focusing on designing what modules are needed and how they are going to interact, interface design and data design. Based on input from analysis phase, there are five modules for this prototype which are: i) Admin Login - This is to authenticate the prototype administrator and gives access to restricted options. ii) Teacher Survey - In this module, user needs to fill in the demographic information and answer questions from five focus areas described previously. Identified questionnaire from analysis phase is used in this module. iii) Student Survey - Similar with Teacher Survey. However, the contents for this module is different in terms of questions and answer. 27 iv) Survey Result - Survey Result module represent survey result for an individual user after answer survey question and can be used to retrieve past result as well. v) Overall Result - Overall result display the overall result from all respondents. The value displayed is the average score from all respondent based on survey category. - Only administrator can access this module. The fundamentals of user interface design principles has taken into account while designing the prototype user interface. Scott, W.A. describes a collection of principles for improving the quality of your user interface design. These principles are: i) The structure principle - organize the user interface purposefully, in meaningful and useful ways based on clear, consistent models that are apparent and recognizable to users. ii) The simplicity principle - Common tasks simple to do, communicating clearly and simply in the user’s own language. iii) The visibility principle - Keep all needed options and materials for a given task visible without distracting the user with extraneous or redundant information. iv) The feedback principle - Keep users informed of actions or interpretations, changes of state or condition, and errors or exceptions v) The tolerance principle - Flexible and tolerant, reducing the cost of mistakes and misuse by allowing undoing and redoing. 28 vi) The reuse principle - Reuse internal and external components and behaviors, maintaining consistency with purpose. Entity relationship diagram, context diagram, data flow diagram and flowchart is used to design data and system architecture. The diagrams can be referred to Appendix E, F, G, and H respectively. 3.3.4 Implementation In this phase, the design is translated into code. The prototype would be developed as a windows application using Microsoft Visual Studio suite and Visual Basic.Net as its programming language. The database application would be built in SQL Server to store the data. 3.3.4.1 Hardware Requirement Below is the list of hardware requirement in order to develop the prototype: i) Laptop ii) Processor – Intel Core 2 Duo T5550 (1.83 GHz) iii) RAM – 1 MB DDR2 iv) Hard Disk – 160 GB 29 3.3.4.2 Software Requirement Below is the list of software requirement in developing phase: 3.3.5 i) Operating System – Windows XP/Vista ii) Programming application - Microsoft Visual Studio suite iii) Database - Microsoft SQL Server Testing The prototype is tested in this phase. There are three types of test involved which are unit testing, system testing and user testing. In unit testing, each unit or module of the prototype is tested individually to ensure it works properly and as intended. In system testing, the prototype is tested as whole. The separate prototype units are brought together and tested as whole to ensure all of its can work and interact. In addition, it is also important to ensure the prototype can interact with database, works on the intended platform, and produces intended output. For user testing, some teachers and students from Sekolah Menengah Kebangsaan Taman Tun Dr Ismail, Selangor (SMK TTDI) has been chosen to test the prototype. The testing is to examine user acceptance and to collect data as the findings for this study. 30 3.3.6 Maintenance The maintenance phase is the last phase of waterfall model and it is important to ensure the functionality of a system can keep continue. For this project, maintenance phase involves upgrade the units like adding new survey questions, maintain the database, improving its user interface and other user requirement once it delivered to the customer. 3.4 Summary The method described in this chapter is used in order to accomplish this study objective as stated in Chapter 1. Waterfall model is applied to ensure this study execute with smoothly and systematically. In addition, social cognitive theory is applied as the measurement model for information security awareness model. The awareness and weights scale are from previous similar study by Kruger and Kearney (2006). However, some modifications have been done to suit with secondary school environment. Chapter 4 describes the findings for this study. 31 CHAPTER 4 INFORMATION SECURITY AWARENESS FOR TEACHER AND STUDENT TOOL (ISATS) 4.1 Introduction The focus of this chapter is to discuss the result of the prototype findings in evaluating the information security awareness level among teacher and student at secondary school. As the main prototype purpose to evaluate the information security awareness level among teacher and student, it was being named ISATS – Information Security Awareness Level for Teacher and Student Tool. The test has carried out at SMKTTDI as described in Chapter 3, and has given a result as expected. The findings will be described according to existing ISATS modules. 32 4.2 Information Security Awareness For Teacher And Student Tool (ISATS) Specifically, there are five modules in this prototype as identified in Chapter 3 which are Admin Login, Teacher Category Survey, Student Category Survey, Survey Result and Overall Survey Result. 4.2.1 Admin Login Admin Login module is to authenticate the correct system administrator by authorized the username and password (Figure 4.1). The purpose of admin login is to monitor the prototype and only admin can access the overall survey result. Figure 4.1: Login Form After the correct login, automatically the Overall Result menu will appear (Figure 4.2). The different can be seeing when the Overall Result menu disappears if someone who are not administrator or end users using ISATS (Figure 4.3). 33 Figure 4.2: Admin Access Menu Figure 4.3: End User Access Menu 34 4.3.2 Teacher Category Survey Teacher Category Survey module is where the end user under teacher category answer survey questions (Figure 4.4). The input for this module is the user demographic information and answer for each question. Figure 4.4: Teacher Category Survey End user must completely answer all questions from the three dimensions named Knowledge, Behavior and Attitude in order to obtain reliable result. Then the user input will be passed to database after user press on Submit Survey button. The survey output will be displayed in Survey Result module. 4.3.3 Student Category Survey Basically, Student Category Survey (Figure 4.5) is similar with Teacher Category Survey in terms of its functionality, data input and connection with database. However, the questions for student are different with teacher based on their age and computer or Internet experience. 35 Figure 4.5: Student Category Survey 4.3.4 Survey Result The result of survey will automatically generate after end user press Submit Survey button at Survey module. The result is calculated based on weight and awareness scale. During the user testing, this module managed to work properly and generate the weights and awareness scale (Figure 4.6). Figure 4.6: Survey Result 36 The scale output can be viewed in bar chart, number and text form. It depicts user knowledge, behavior and attitude level. The total of those three components represents user information security awareness level. There is also an indicator of awareness level whether Satisfactory, Average or Unsatisfactory. Another output is user’s reference number which is unique and it can be used if user would like to retrieve their result in future (Figure 4.7 and Figure 4.8). In order to retrieve result, user must enter survey category whether Teacher or Student and their reference number as data input. Figure 4.7: Retrieve Survey Result (Student Example) 37 Figure 4.8: Retrieve Result (Teacher Category Example) 4.3.5 Overall Survey Result As stated in Section 4.2.1, only ISATS administrator can access this module. This module function is to generate the overall result for both categories. The average of each dimension and awareness level is calculated in order to obtain the output. There is no data input from user in this module except for it needs for user input to press each Generate Result button. The output is in bar chart, text and number form. 38 Figure 4.9: Overall Survey Result There are three sections in this module. First section is the overall teacher result that displays the output of knowledge, behavior and attitude average. The second section depicts the same output type but for student category. The third or last section display overall awareness level result for both teacher and student. Besides of viewing the average and overall level, this module also presents the comparisons between teacher and student awareness level. This module has worked properly during the user testing. From the collected data, it has generated the average awareness level for 15 teachers and students which are 93% and 67%. It shows that teacher got satisfactory awareness level and student got average awareness level (Figure 4.9). However, the result can be change if more data will be collected in future. 39 4.4 Summary There are five modules of ISATS and each module has its own function to evaluate information security awareness level. It shows that ISATS can be use in future as an automated tool to evaluate information security awareness level among teacher and student in secondary school. Discussion for this study will be discussed in the next chapter. 40 CHAPTER 5 DISCUSSION 5.1 Introduction The application of ABC model from social cognitive theory as the assessment model and using automated tool to generate the output is the base for this study. The development of ISATS and the user testing has shown positive result in this study. However, there are a lot of viewpoint that can be taken into consideration in order to produce better result. 5.2 Discussion of ISATS From the user testing, we can see that ISATS has worked as intended. The main points to test are its ability to process weights and awareness scale from user answers and produce the output as expected. It is important with the aim of achieving this study objective. With the generated survey result in Result Survey module, ISATS has achieved one of its objectives which is to identify the information security awareness level of secondary school teacher and student. ISATS also can analyze the survey result from overall survey input instead of individual survey result. 41 The application of ABC model as the base of awareness level assessment and AHP to calculate the weights and awareness scale has shown that the next objective which is to develop an appropriate model of information security awareness to secondary teacher and student has achieved as well. The positive feedback from users also gives optimistic view for this project. They have given full cooperation in order to carry out the user testing. Furthermore, ISATS has created new experience to most of the users. Feedbacks from users are like they were curious to know detail about information security awareness and eager to assess their information security awareness level. There are some information security terms that they never know before like “phishing”, social engineering and this has made them interested to know detail about it. Instead of manage to execute user testing and achieved this study aim, it also has supplied new information to the users. Besides of get their awareness level, they found new terms and knowledge as well. It gives the idea to expand the information security awareness information or knowledge at secondary school environment based on their positive feedback. Moreover, the users also give some useful opinions to enhance ISATS especially in terms of interface design. 5.3 Summary Discussion described in this chapter has proven that ISATS has achieved its objectives. Although there are a few flaws especially for user interface design, it can be enhanced in order to produce better result in future. Chapter 6 concludes all this study, and discusses project limitation as well as future work suggestion. 42 CHAPTER 6 CONCLUSION 6.1 Introduction This chapter concludes this study by discussing numerous limitations and the right dimension for ISATS in the future. Besides, this chapter also summarized the result of this study. 6.2 Limitations Limitations identified for this study, as listed below: i) The survey questions are limited, which is one question for each focus area for the three dimensions. ii) User interface is not properly design, due to time constraints and researcher focus more on theory part. 43 iii) Sample size for user testing is only 15 teachers and students. The number of sample size should increase for future work in order to achieve more accurate result. 6.3 Conclusion Remarks Information security awareness is not a new thing but the continuous study is needed to find improved and better way in order to create the awareness among society. As our society is comprises of different group of age, lifestyle, status, job and so on, the approach to create the awareness would be different as well. There are a lot of secondary source regarding information security awareness. In addition, there is study of information security awareness in school environment. It shows that information security professional had identified that school student and teacher as a group to convey the idea of awareness as well. ISATS development can aid as an automated tool to evaluate their awareness level. It can be use to indicate or compare the different before and after they know about information security. However, there are some improvements that can improve ISATS. 6.4 Future Work ISATS has a potential to be improved further and provides more functionality before it can be implemented in real world. Here are several examples of future work suggestions: 44 i) Create a question bank - The question can be randomly generated every time it displayed to user. It can reduce answer learning among the user. Besides, ISATS administrator can update the question bank with new questions. ii) Improve user interface design – Some multimedia elements can be integrated into ISATS especially for student category to add their excitement while answering survey questions. iii) ISATS can be developed or upgraded as a web-based application. It is easier mainly if more than one school is interested in using ISATS. The school only needs to create an account and the users can access it online. Therefore, the administrator does not have to install ISATS at each site (school) and it can save budget. iv) The focus area can be modified as well. This is due to the latest issue that we always encounter in computer and information security world. v) Provide dual-language (English and Malay language) so that user can choose as there is some students who are not really literate in English. It can affect their answer if they do not understand the questions need and as a result, the output is not reliable. Optimistically, ISATS can give contribution to information security awareness field and other recommendations are welcomed so that ISATS can be implemented successfully. 45 REFERENCES Albrechtsen, E. (2007). A qualitative study of users' view on information security. Computers & Security. 26 (4): 276-289. Bandura, A. (1989). Social Cognitive Theory. Retrieved on March 3, 2009 from: http://www.des.emory.edu/mfp/Bandura1989ACD.pdf Beranek, L. (2009). Information Systems Security Education for Future Teacher At Secondary And Primary Schools. Journal of Technology and Information Education. 1(2): 89-93. Center for Development of Advanced Computing. Handbook of Information Security Awareness for Teacher and Parents. Retrieved on March 4, 2009 from: http://infosecawareness.in/downloads/isa-for-teacher-and-parents Center for Education and Research in Information Security (CERIAS). Information Security Questionnaire: K12 Outreach. Retrieved on February 2, 2009 from: www.cerias.purdue.edu/education/k12/cerias_resources/files/questionnaire/infosec_ questionnaire.pdf Chai, S., et.al. (2006). Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior. Issues in Informing Science and Information Technology. 3: 127-135. Chen, C.C., Shaw, R.S., Yang, S.C. (2006). Mitigating Information Security Risks by Increasing User Security Awareness: A Case Study of an Information Security Awareness System. Information Technology Learning and Performance Journal. 24 (1). Dlamini, M.T., Eloff, J.H.P., Eloff, M.M. (2008). Information security: The moving target. Computers & Security. In Press. Corrected Proof.Available online 11 December 2008. 46 Drevin, L., Kruger, H.A., Steyn, T. (2007). Value-focused assessment of ICT security awareness in an academic environment. Computers and security. 26: 36-43. ISO27001. Code of practice for information security management. UK: British Standards Institute; 2005. Furnell, S.M., Bryant, P., Phippen, A.D. (2007). Assessing the security perceptions of personal Internet users. Computers & Security. 26 (5): 410 – 417. Furnell, S.M., Gennatou, M., Dowland, P.S. (2002). A prototype tool for information security awareness in training. Logistics Information Management. 15 (5 – 6): 352-357. Hentea, M. (2005). A perspective on achieving information security awareness. Issues in Informing Science & Information Technology. (2): 169-178. Katz, F.H. (2005). The Effect of a University Information Security Survey on Instruction Methods in Information Security. Information Security Curriculum Development (InfoSecCD) Conference '05.43 – 48. Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for research activities. Educational and Psychological Measurement. 30: 607-610. Kritzinger, E., Smith, E. (2008). Information security management: An information security retrieval and awareness model for industry. Computers & Security. 27:224231. Kruger, H.A., Kearney, W.D., (2006). A prototype for assessing information security awareness. Computers & Security. 25 (4): 289-296. Matthew, C., Sewry, D.A. (2004). South African IT industry professionals' ethical awareness: an exploratory study. ACM International Conference Proceeding Series. 75: 269-273 47 Martha, A., Iain, W., and Ngaire, D. (2006). Social Cognition: An Integrated Approach.2nd Edition.SAGE Publisher. London. Micki, K., Harold, F. T. (2007). Handbook of Information Security Management. CRC Press LLC. O’Regan, G. (2008). A Brief History of Computing. Publisher:Springer. Professional Information Security Association (PISA). (2003). Report of Information Security Survey on Education Sector. Retrieved on March 3, 2009 from: http://www.pisa.org.hk/projects/edsec2003/pressrel_eng.pdf Saaty, T.L. 1980. The analytic hierarchy process. McGraw-Hill. Schlienger, T. & Teufel, S. 2003. Information security culture – from analysis to change, South African Computer Journal. 31:46-52. Scheffler, F.L., Logan, J.P. (2000). Computer Technology in Schools: What Teachers Should Do and Be Able To Do. Journal of Research on Computing in Education. 31(3): 305-325. Scott, W.A. (n.d). User Interface Design, Tips, techniques and Principle. Retrieved July 11, 2009 from: http://www.ambysoft.com/essays/userInterfaceDesign.html Siponen, M.T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security. 8 (1): 31-41. Siponen, M.T. (2001). Five Dimensions of Security Awareness. Computer and Society. Siponen, M.T., Kukkonen, H.O. (2007). A review of information security issues and respective research contributions. The DATA BASE for Advances in Information Systems. 38(1):60-80. 48 University of Florida’s IT Security Team. Awareness Questionnaire. Retrieved on February 2, 2009 from: http://www.questionpro.com/akira/TakeSurvey?id=567135 Yacine, R., Mark, A. (2008). Information security awareness term in higher education: An exploratory study. Computers & Security. 27 (7-8):241 – 253. Vargas, L.G. & Dougherty, J.J. (1982). The analytic hierarchy process and multicriterion decision making. American Journal of Mathematical and Management Sciences, 19(1):59-92. Wee, S.H. (1999).Internet Use Amongst Secondary School Students in Kuala Lumpur, Malaysia. Malaysian Journal of Library & Information Science. 4 (2). pp. 1-20. ISSN 1394-6234 Zahri Yunos and Sharifah Sajidah. (2005). Keeping Kids Safe Online. Retrieved on February 2, 2009 from: http://www.cybersecurity.org.my/data/content_files/13/61.pdf?.diff=1176416899 49 APPENDIX A – GANTT CHART 50 APPENDIX B – SURVEY QUESTIONS Teacher Category: Knowledge 51 Teacher Category: Behavior 52 Teacher Category: Attitude 53 Student Category: Knowledge 54 Student Category: Behavior 55 Student Category: Attitude 56 APPENDIX C – TOP INTERNET MAIN USE SURVEY QUESTIONS TEACHER CATEGORY INFORMATION SECURITY QUESTIONNAIRE Directions: Please answer the questions honestly and to the best of your I am conducting a survey to evaluate the level of information security awareness among teachers at secondary school. I would appreciate if you could spare 10 minutes to answer a few brief questions about information security. ability. All information is confidential. Part A: Background Information Age : _____ Gender: _________ School: _______________________________________________ 1. On average, how much time do you spend on the Internet per day? A. < 2 hours B. 2 – 4 hours C. 4 – 6 hours D. > 6 hours 2. What are your top three main uses for the Internet? □ Email □ Shopping □ Chatting □ Work □ Games □ Banking/Paying bills □ Social network sites (eg. MySpace, Friendster, etc.) □ Others (please specify) __________________________ 3. Please tick (l) security related terms that you understand. □ Virus □ Hacker □ Firewall □ Spyware □ Phishing □ Identity theft □ Worm □ Trojan horse 57 STUDENT CATEGORY SOAL SELIDIK KESEDARAN KESELAMATAN MAKLUMAT DI KALANGAN PELAJAR SEKOLAH MENENGAH ARAHAN: SILA JAWAB SOALAN DI BAWAH DENGAN JUJUR. SEGALA MAKLUMAT AKAN DIRAHSIAKAN. Bahagian A: Maklumat Latarbelakang Umur : _____ Jantina: _________ Tingkatan: __________ Sekolah: __________________ 1. Secara purata, berapa banyak masa yang anda habiskan untuk melayari Internet setiap hari? A. < 2 jam B. 2 – 4 jam C. 4 – 6 jam D. > 6 jam 2. Apakah tiga perkara utama yang anda lakukan sewaktu melayari Internet? (Tandakan 3 sahaja) □ Email □ Membeli belah □ Berbual (chatting) □ Kerja sekolah □ Permainan komputer □ Laman rangkaian sosial (cth. MySpace, Friendster, dll.) □ Lain-lain (sila nyatakan) __________________________ 3. Tandakan istilah mengenai keselamatan komputer yang anda fahami. □ Virus □ Hacker □ Firewall □ Spyware □ Phishing □ Pencuri Identiti / Identity theft □ Worm □ Trojan horse 58 APPENDIX D - ENTITY RELATIONSHIP DIAGRAM password username Admin TeachTotal TeachAttitud 1 1 StudTotal StudKnow monitor TeachRefNo M M Teacher TeachAge StudBehav TeachKnow StudRefNo Student M TeachBehav StudAttitude StudGender TeachGender StudAge accumulate result accumulate result TeachAver AllTeachKnow StudAverage 1 AllStudBehav AllTeachAttitude 1 AllStudent AllTeacher AllTeachBehav AllStudKnow AllStudAttitude 59 APPENDIX E- CONTEXT DIAGRAM Admin Username and password Authorized admin Answer survey Teacher Survey Result Reference No. Retrieved survey result Answer survey ISATS Survey Result Reference No. Retrieved survey result Student 60 APPENDIX F– DATA FLOW DIAGRAM U s e rn a m e a n d p a s s w o rd A d m in 1 .0 A d m in d a ta A u th e n tic a te D 1 A d m in A d m in in f o A u th o riz e d a d m in T e a c h e r re s u lt d a ta R e q u e s t o v e r a ll r e s u lt A llT e a c h e r D 1 2 .0 O v e r a ll r e s u lt s u m m a ry T e a c h e r o v e r a ll G e n e ra te o v e r a ll r e s u lt S tu d e n t r e s u lt d a ta D 2 in f o r m a t io n A llS tu d e n t S tu d e n t o v e r a ll in fo r m a tio n T e a ch e r S u rv e y a n s w e r S u rv e y a n s w e r 3 .0 C a lc u la t e w e ig h ta g e T e a c h e r w e ig h ta g e d a ta S tu d e n t w e ig h ta g e d a ta D 3 T e a ch e r D 4 S t u d e n t w e ig h ta g e in f o r m a t io n S tu d e n t T e a c h e r r e s u lt S tu d e n t r e s u lt 4 .0 G e n e ra te s u r v e y r e s u lt T e a c h e r w e ig h ta g e in fo r m a tio n S tu d e n t 61 APPENDIX G – FLOWCHART FLOWCHART – MAIN MENU Start 5 System Survey Result yes yes yes 1 2 3 62 FLOWCHART – SYSTEM 1 Admin login Admin logoff Username and password Logout exit No Verifying authentication Valid login Yes 5 Exit 4 63 FLOWCHART – SURVEY 2 Teacher Student Yes Yes No No No Key-in survey answer Key-in survey answer Submit survey Submit survey 3 4 5 64 FLOWCHART – RESULT 3 Survey result Overall result Yes Yes No IS awareness level Generate all survey result Retrieve result Yes No Display all survey result Select category Reference no 4 5 65 APPENDIX H – ISATS SOURCE CODE MAIN MENU MODULE Public Class frmMain1 Private Sub lblAdmin_MouseHover(ByVal sender As Object, ByVal e As System.EventArgs) Handles lblSystem.MouseHover Panel1.Visible = True End Sub Private Sub lblSurvey_MouseHover(ByVal sender As Object, ByVal e As System.EventArgs) Handles lblSurvey.MouseHover Panel2.Visible = True End Sub Private Sub lblReport_MouseHover(ByVal sender As Object, ByVal e As System.EventArgs) Handles lblReport.MouseHover Panel3.Visible = True End Sub Private Sub Panel1_MouseLeave(ByVal sender As Object, ByVal e As System.EventArgs) Handles Panel1.MouseLeave Panel1.Visible = False End Sub Private Sub Panel2_MouseLeave(ByVal sender As Object, ByVal e As System.EventArgs) Handles Panel2.MouseLeave Panel2.Visible = False End Sub Private Sub Panel3_MouseLeave(ByVal sender As Object, ByVal e As System.EventArgs) Handles Panel3.MouseLeave Panel3.Visible = False End Sub Private Sub lblStudent_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles lblStudent.Click 'show form frmStudent.Show() Me.Hide() End Sub Private Sub lblTeacher_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles lblTeacher.Click Me.Hide() frmTeacher.Show() End Sub Private Sub lblResult_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles lblResult.Click Me.Hide() 66 frmResult.Show() End Sub Private Sub lblOverall_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles lblOverall.Click Me.Hide() frmOverall.Show() End Sub Private Sub lblAdmin_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles lblAdmin.Click LoginForm1.Show() Me.Hide() End Sub Private Sub lblLogoff_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles lblLogoff.Click lblWelcome.Visible = False lblOverall.Visible = False MsgBox("You've been signed out from system") End Sub Private Sub Label2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Label2.Click Me.Close() End Sub End Class 67 TEACHER CATEGORY SURVEY MODULE Public Class frmTeacher Dim TeachKnow As Integer = 0 Dim TeachBehav As Integer = 0 Dim TeachAtt As Integer = 0 Private Sub frmTeacher_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load 'fill data adapter SqlDataAdapter1.Fill(DsTeachInfo1) myTransfer.Fill(DsTransfer1) End Sub Private Sub rdbK1b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbK1b.CheckedChanged TeachKnow = TeachKnow + 6 End Sub Private Sub rdbKa2_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbKa2.CheckedChanged TeachKnow = TeachKnow + 6 End Sub Private Sub rdbK3a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbK3a.CheckedChanged TeachKnow = TeachKnow + 6 End Sub Private Sub rdbK4a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbK4a.CheckedChanged TeachKnow = TeachKnow + 6 End Sub Private Sub rdbK5c_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbK5c.CheckedChanged TeachKnow = TeachKnow + 6 End Sub Private Sub rdbB1d_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbB1d.CheckedChanged TeachBehav = TeachBehav + 10 End Sub Private Sub rdbB1c_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbB1c.CheckedChanged TeachBehav = TeachBehav + 5 End Sub Private Sub rdbB2a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbB2a.CheckedChanged TeachBehav = TeachBehav + 10 End Sub 68 Private Sub rdbB3d_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbB3d.CheckedChanged TeachBehav = TeachBehav + 10 End Sub Private Sub rdbB3c_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbB3c.CheckedChanged TeachBehav = TeachBehav + 5 End Sub Private Sub rdbB4a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbB4a.CheckedChanged TeachBehav = TeachBehav + 10 End Sub Private Sub rdbB5b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbB5b.CheckedChanged TeachBehav = TeachBehav + 10 End Sub Private Sub rdbB5bc_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbB5bc.CheckedChanged TeachBehav = TeachBehav + 10 End Sub Private Sub rdbA1a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbA1a.CheckedChanged TeachAtt = TeachAtt + 4 End Sub Private Sub rdbA2b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbA2b.CheckedChanged TeachAtt = TeachAtt + 4 End Sub Private Sub rdbA3a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbA3a.CheckedChanged TeachAtt = TeachAtt + 4 End Sub Private Sub rdbA3b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbA3b.CheckedChanged TeachAtt = TeachAtt + 2 End Sub Private Sub rdbA4a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbA4a.CheckedChanged TeachAtt = TeachAtt + 4 End Sub Private Sub rdbA4b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbA4b.CheckedChanged TeachAtt = TeachAtt + 2 End Sub 69 Private Sub rdbA5a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbA5a.CheckedChanged TeachAtt = TeachAtt + 4 End Sub Private Sub rdbA5b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbA5b.CheckedChanged TeachAtt = TeachAtt + 2 End Sub Private Sub btnSubmit_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnSubmit.Click 'insert(New row) Dim drNewRow As DataRow = DsTeachInfo1.Tables("Teacher").NewRow drNewRow("TeachKnow") = TeachKnow drNewRow("TeachAttitude") = TeachAtt drNewRow("TeachBehav") = TeachBehav drNewRow("TeachGender") = cboGenderT.Text drNewRow("TeachAge") = Val(txtAgeT.Text) DsTeachInfo1.Tables("Teacher").Rows.Add(drNewRow) SqlDataAdapter1.Update(DsTeachInfo1) drNewRow.AcceptChanges() 'update total value in AllTeacher table CalcTotal() calcTotalBehav() calcTotalAttit() 'display category on frmResult frmResult.lblCategory.Text = "Teacher" 'show form result Me.Close() frmResult.Show() End Sub Public Sub CalcTotal() 'update total value Dim strKnow As String strKnow = "UPDATE AllTeacher SET TotKnow =TotKnow + " & TeachKnow myTransfer.SelectCommand.CommandText = strKnow myTransfer.Update(DsTransfer1) myTransfer.Fill(DsTransfer1) End Sub Public Sub calcTotalBehav() Dim strBehav As String strBehav = "UPDATE AllTeacher SET TotBehav =TotBehav + " & TeachBehav 70 myTransfer.SelectCommand.CommandText = strBehav myTransfer.Update(DsTransfer1) myTransfer.Fill(DsTransfer1) End Sub Public Sub calcTotalAttit() Dim strAtt As String strAtt = "UPDATE AllTeacher SET TotAtt =TotAtt + " & TeachAtt myTransfer.SelectCommand.CommandText = strAtt myTransfer.Update(DsTransfer1) myTransfer.Fill(DsTransfer1) End Sub Private Sub btnHome_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnHome.Click Me.Close() frmMain1.Show() End Sub Private Sub btnExit_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnExit.Click End End Sub End Class 71 STUDENT CATEGORY SURVEY Public Class frmStudent Dim knowStudent As Integer = 0 Dim BehavStudent As Integer = 0 Dim AttStudent As Integer = 0 Private Sub frmStudent_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load 'fill data adapter SqlDataAdapter1.Update(DsStudent1) myStudent.Fill(DsMyStudent1) End Sub Private Sub rdbQK1c_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQK1c.CheckedChanged knowStudent = knowStudent + 6 End Sub Private Sub rdbQ2a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQ2a.CheckedChanged knowStudent = knowStudent + 6 End Sub Private Sub rdbQK3b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQK3b.CheckedChanged knowStudent = knowStudent + 6 End Sub Private Sub rdbQK4b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQK4b.CheckedChanged knowStudent = knowStudent + 6 End Sub Private Sub rdbQK5a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQK5a.CheckedChanged knowStudent = knowStudent + 6 End Sub Private Sub btnSubmit_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnSubmit.Click 'insert(New row) Dim drNewRow As DataRow = DsStudent1.Tables("Student").NewRow drNewRow("StudKnow") = knowStudent drNewRow("StudAttitude") = AttStudent drNewRow("StudBehav") = BehavStudent drNewRow("StudGender") = cboGender.Text 'drNewRow("SurveyDate") = lblTimer.Text drNewRow("StudAge") = Val(txtAge.Text) DsStudent1.Tables("Student").Rows.Add(drNewRow) SqlDataAdapter1.Update(DsStudent1) 72 drNewRow.AcceptChanges() 'update total awareness level CalcTotal() calcTotalBehav() calcTotalAtt() 'set category frmResult.lblCategory.Text = "Student" 'go to chart output Me.Close() frmResult.Show() End Sub Private Sub rdbB2_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbB2.CheckedChanged BehavStudent = BehavStudent + 10 End Sub Private Sub rdbQB2a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQB2a.CheckedChanged BehavStudent = BehavStudent + 10 End Sub Private Sub rdbQB2b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQB2b.CheckedChanged BehavStudent = BehavStudent + 5 End Sub Private Sub rdbQB2c_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQB2c.CheckedChanged BehavStudent = BehavStudent + 3 End Sub Private Sub rdbQB3b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQB3b.CheckedChanged BehavStudent = BehavStudent + 10 End Sub Private Sub rdbQB3c_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQB3c.CheckedChanged BehavStudent = BehavStudent + 10 End Sub Private Sub rdbQB4a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQB4a.CheckedChanged BehavStudent = BehavStudent + 10 End Sub Private Sub rdbQB5a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQB5a.CheckedChanged BehavStudent = BehavStudent + 10 End Sub 73 Private Sub rdbQA1b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQA1b.CheckedChanged AttStudent = AttStudent + 4 End Sub Private Sub rdbQA2b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQA2b.CheckedChanged AttStudent = AttStudent + 4 End Sub Private Sub rdbQA3b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQA3b.CheckedChanged AttStudent = AttStudent + 4 End Sub Private Sub rdbQA4b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQA4b.CheckedChanged AttStudent = AttStudent + 4 End Sub Private Sub rdbQA5a_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQA5a.CheckedChanged AttStudent = AttStudent + 4 End Sub Private Sub rdbQA5b_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQA5b.CheckedChanged AttStudent = AttStudent + 2 End Sub Private Sub rdbQA5c_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles rdbQA5c.CheckedChanged AttStudent = AttStudent + 1 End Sub Public Sub CalcTotal() 'update total value Dim strKnow As String strKnow = "UPDATE AllStudent SET TotKnowStud =TotKnowStud + " & knowStudent myStudent.SelectCommand.CommandText = strknow myStudent.Update(DsMyStudent1) myStudent.Fill(DsMyStudent1) End Sub Public Sub calcTotalBehav() Dim strBehav As String strBehav = "UPDATE AllStudent SET TotBehavStud =TotBehavStud + " & BehavStudent myStudent.SelectCommand.CommandText = strBehav 74 myStudent.Update(DsMyStudent1) myStudent.Fill(DsMyStudent1) End Sub Public Sub calcTotalAtt() Dim strAtt As String strAtt = "UPDATE AllStudent SET TotAttitStud =TotAttitStud + " & AttStudent myStudent.SelectCommand.CommandText = strAtt myStudent.Update(DsMyStudent1) myStudent.Fill(DsMyStudent1) End Sub Private Sub btnHome_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnHome.Click Me.Close() frmMain1.Show() End Sub Private Sub btnExit_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnExit.Click End End Sub End Class 75 SURVEY RESULT MODULE Public Class frmResult Public Sub createChart() Dim I As Integer = 3 'First Step AxMSChart1.RowCount = 1 'Specify count of rows to be 5 AxMSChart1.ColumnCount = 3 'Specify count of graphs to be 2 If lblCategory.Text = "Student" Then 'the loop For I = 1 To AxMSChart1.RowCount 'Here it is dynamically and will work in all cases of values for AxMSChart1.Row 'Set that we want to edit the row "I" AxMSChart1.Row = I 'Setting it's label to I AxMSChart1.RowLabel = I 'Editing the first graph AxMSChart1.Column = 1 'Set that I want to edit the second graph AxMSChart1.Data = txtKnowledge.Text 'Editing the second Graph AxMSChart1.Column = 2 'Set that I want to edit the second graph AxMSChart1.Data = txtBehavior.Text 'editing the third Graph AxMSChart1.Column = 3 'Set that I want to edit the second graph AxMSChart1.Data = txtAttitude.Text Next ElseIf lblCategory.Text = "Teacher" Then For I = 1 To AxMSChart1.RowCount 'Here it is dynamically and will work in all cases of values for AxMSChart1.Row 'Set that we want to edit the row "I" AxMSChart1.Row = I 'Setting it's label to I AxMSChart1.RowLabel = I 'Editing the first graph AxMSChart1.Column = 1 'Set that I want to edit the second graph AxMSChart1.Data = txtKnowT.Text 'Editing the second Graph AxMSChart1.Column = 2 'Set that I want to edit the second graph 76 AxMSChart1.Data = txtBehavT.Text 'editing the third Graph AxMSChart1.Column = 3 'Set that I want to edit the second graph AxMSChart1.Data = txtAttiT.Text Next End If End Sub Private Sub frmResult_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load Dim strLast As String DsChart1.Clear() DsChartT1.Clear() If (lblCategory.Text) = "Student" Then 'visible group box GroupBox1.Visible = True 'load database strLast = "SELECT StudRefNo,StudKnow,StudAttitude,StudBehav FROM Student WHERE StudRefNo = (SELECT MAX(StudRefNo)FROM Student)" myData.SelectCommand.CommandText = strLast myData.Fill(DsChart1) TotalStudent() ElseIf (lblCategory.Text) = "Teacher" Then GroupBox4.Visible = True strLast = "SELECT TeachRefNo,TeachKnow,TeachAttitude,TeachBehav FROM Teacher WHERE TeachRefNo = (SELECT MAX(TeachRefNo)FROM Teacher)" myTeachData.SelectCommand.CommandText = strLast myTeachData.Fill(DsChartT1) TotalTeacher() End If createChart() End Sub Private Sub btnHome_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnHome.Click Me.Close() frmMain1.Show() End Sub Public Sub FindTeacher() Dim strSelectString As String DsChartT1.Clear() strSelectString = "SELECT * FROM Teacher WHERE TeachRefNo =" & txtRef.Text 77 myTeachData.SelectCommand.CommandText = strSelectString myTeachData.Fill(DsChartT1) lblCategory.Text = "Teacher" End Sub Public Sub FindStudent() Dim strSelectString As String DsChart1.Clear() strSelectString = "SELECT * FROM Student WHERE StudRefNo =" & txtRef.Text myData.SelectCommand.CommandText = strSelectString myData.Fill(DsChart1) lblCategory.Text = "Student" End Sub Public Sub TotalStudent() Dim StdTotal As Integer StdTotal = Val(txtKnowledge.Text) + Val(txtBehavior.Text) + Val(txtAttitude.Text) txtTotal.Text = StdTotal & "%" If StdTotal >= 80 Then lblIndStud.Text = "Satisfactory" ElseIf StdTotal >= 60 And StdTotal <= 79 Then lblIndStud.Text = "Average" Else lblIndStud.Text = "Unsatisfactory!!" lblIndStud.ForeColor = Color.Red End If lblRef.Visible = True End Sub Public Sub TotalTeacher() Dim TeachTotal As Integer TeachTotal = Val(txtKnowT.Text) + Val(txtBehavT.Text) + Val(txtAttiT.Text) txtTotalT.Text = TeachTotal & "%" If TeachTotal >= 80 Then lblIndTeach.Text = "Satisfactory" ElseIf TeachTotal >= 60 And TeachTotal <= 79 Then lblIndTeach.Text = "Average" Else lblIndTeach.Text = "Unsatisfactory!!" lblIndTeach.ForeColor = Color.Red End If lblRefT.Visible = True End Sub Private Sub btnResult_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnResult.Click Dim intnumrows As Integer If cboCategory.Text = "Teacher" Then FindTeacher() intNumRows = DsChartT1.Tables("Teacher").Rows.Count 78 If intNumRows = 0 Then MsgBox("Nobody with that reference number") txtRef.Text = "" Exit Sub End If GroupBox4.Visible = True GroupBox1.Visible = False lblRef.Visible = False TotalTeacher() createChart() ElseIf cboCategory.Text = "Student" Then FindStudent() intnumrows = DsChart1.Tables("Student").Rows.Count If intnumrows = 0 Then MsgBox("Nobody with that reference number") txtRef.Text = "" Exit Sub End If GroupBox1.Visible = True GroupBox4.Visible = False lblRefT.Visible = False TotalStudent() createChart() End If End Sub Private Sub cboCategory_SelectedIndexChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles cboCategory.SelectedIndexChanged GroupBox1.Visible = False GroupBox4.Visible = False txtRef.Text = "" End Sub Private Sub btnExit_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnExit.Click End End Sub End Class 79 OVERALL RESULT MODULE Public Class frmOverall Dim kT, bT, aT, kS, bS, atS As Double Dim totStud, totTeach As Integer Private Sub frmOverall_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load 'clear data adapter DsConnTeacher1.Clear() DsConnStudent1.Clear() End Sub Public Sub countTeacher() Dim strCount As String 'DsConnTeacher1.Clear() strCount = "update AllTeacher set TotTeach=(SELECT COUNT (TeachRefNo) FROM Teacher) " connTeacher.SelectCommand.CommandText = strCount connTeacher.Update(DsConnTeacher1) connTeacher.Fill(DsConnTeacher1) kT = (lblKT.Text) / (lblTotTeach.Text) bT = (lblBT.Text) / (lblTotTeach.Text) aT = Val(lblAT.Text)/ Val(lblTotTeach.Text) End Sub Public Sub countStudent() Dim strCount As String 'DsConnStudent1.Clear() strCount = "update AllStudent set TotStudent=(SELECT COUNT (StudRefNo) FROM Student) " connStudent.SelectCommand.CommandText = strCount connStudent.Update(DsConnStudent1) connStudent.Fill(DsConnStudent1) kS = (lblKS.Text) / (lblTotStud.Text) bS = (lblBS.Text) / (lblTotStud.Text) atS = Val(lblAS.Text)/ Val(lblTotStud.Text) End Sub Public Sub AveKnowT() Dim strKnow As String strKnow = "UPDATE AllTeacher SET AveKnow =" & kT connTeacher.SelectCommand.CommandText = strKnow 80 connTeacher.Update(DsConnTeacher1) connTeacher.Fill(DsConnTeacher1) End Sub Public Sub aveBehavT() Dim strBehav As String strBehav = "UPDATE AllTeacher SET AveBehav =" & bT connTeacher.SelectCommand.CommandText = strBehav connTeacher.Update(DsConnTeacher1) connTeacher.Fill(DsConnTeacher1) End Sub Public Sub aveAttiT() Dim strAtt As String strAtt = "UPDATE AllTeacher SET AveAtt =" & aT connTeacher.SelectCommand.CommandText = strAtt connTeacher.Update(DsConnTeacher1) connTeacher.Fill(DsConnTeacher1) End Sub Public Sub knowS() Dim strKnow As String strKnow = "UPDATE AllStudent SET AveKnowStud =" & kS connStudent.SelectCommand.CommandText = strKnow connStudent.Update(DsConnStudent1) connStudent.Fill(DsConnStudent1) End Sub Public Sub BehavS() Dim strBehav As String strBehav = "UPDATE AllStudent SET AveBehavStud =" & bS connStudent.SelectCommand.CommandText = strBehav connStudent.Update(DsConnStudent1) connStudent.Fill(DsConnStudent1) End Sub 81 Public Sub AttS() Dim strAtt As String strAtt = "UPDATE AllStudent SET AveAttitStud =" & atS connStudent.SelectCommand.CommandText = strAtt connStudent.Update(DsConnStudent1) connStudent.Fill(DsConnStudent1) End Sub Public Sub createChart() Dim I As Integer = 3 'First Step AxMSChart1.RowCount = 1 'Specify count of AxMSChart1.ColumnCount = 3 'Specify count AxMSChart2.RowCount = 1 'Specify count of AxMSChart2.ColumnCount = 3 'Specify count rows to be 5 of graphs to be 2 rows to be 5 of graphs to be 2 'the loop For I = 1 To AxMSChart1.RowCount 'Here it is dynamically and will work in all cases of values for AxMSChart1.Row 'Set that we want to edit the row "I" AxMSChart1.Row = I AxMSChart2.Row = I 'Setting it's label to I AxMSChart1.RowLabel = I AxMSChart1.RowLabel = I 'Editing the first graph AxMSChart1.Column = 1 'Set that I want to edit the second graph AxMSChart1.Data = txtAverKnowS.Text AxMSChart2.Column = 1 'Set that I want to edit the second graph AxMSChart2.Data = txtAveKnowT.Text 'Editing the second Graph AxMSChart1.Column = 2 'Set that I want to edit the second graph AxMSChart1.Data = txtAveBehavS.Text AxMSChart2.Column = 2 'Set that I want to edit the second graph AxMSChart2.Data = txtAveBehavT.Text 'editing the third Graph AxMSChart1.Column = 3 'Set that I want to edit the second graph AxMSChart1.Data = txtAverAttiS.Text AxMSChart2.Column = 3 'Set that I want to edit the second graph AxMSChart2.Data = txtAverAttiT.Text Next End Sub 82 Private Sub btnHome_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnHome.Click frmMain1.Show() Me.Close() End Sub Private Sub btnTeacher_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnTeacher.Click Dim mangkuk As String DsConnStudent1.Clear() mangkuk = "SELECT * FROM AllTeacher" connTeacher.SelectCommand.CommandText = mangkuk connTeacher.Fill(DsConnTeacher1) 'count average countTeacher() 'update average value AveKnowT() aveBehavT() aveAttiT() 'display value txtAveKnowT.Text = Int(kT) txtAveBehavT.Text = Int(bT) txtAverAttiT.Text = Int(aT) 'generate chart createChart() End Sub Private Sub btnStudent_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnStudent.Click Dim mangkuk As String DsConnStudent1.Clear() mangkuk = "SELECT * FROM AllStudent" connStudent.SelectCommand.CommandText = mangkuk connStudent.Fill(DsConnStudent1) 'count average countStudent() 'update average value knowS() BehavS() AttS() 'display value 83 txtAverKnowS.Text = Int(kS) txtAveBehavS.Text = Int(bS) txtAverAttiS.Text = Int(atS) 'generate chart createChart() End Sub Public Sub TotAverTeacher() Dim totTeach As Integer totTeach = Int(kT + aT + bT) txtTeachT.Text = totTeach If totTeach >= 80 Then lblIndTeach.Text = "Satisfactory" ElseIf totTeach >= 60 And totTeach <= 79 Then lblIndTeach.Text = "Average" Else lblIndTeach.Text = "Unsatisfactory!!" lblIndTeach.ForeColor = Color.Red End If End Sub Public Sub TotAverStudent() totStud = (kS + atS + bS) txtStudentS.Text = Int(totStud) If totStud >= 80 Then lblIndS.Text = "Satisfactory" ElseIf totStud >= 60 And totStud <= 79 Then lblIndS.Text = "Average" Else lblIndS.Text = "Unsatisfactory!!" lblIndS.ForeColor = Color.Red End If End Sub Public Sub createPieChart() Dim I As Integer = 3 'First Step AxMSChart3.RowCount = 1 'Specify count of rows to be 1 AxMSChart3.ColumnCount = 2 'Specify count of graphs to be 3 'the loop For I = 1 To AxMSChart3.RowCount 'Here it is dynamically and will work in all cases of values for AxMSChart1.Row 'Set that we want to edit the row "I" AxMSChart3.Row = I 84 'Setting it's label to I AxMSChart3.RowLabel = I 'Editing the first graph AxMSChart3.Column = 1 'Set that I want to edit the second graph AxMSChart3.Data = txtTeachT.Text 'Editing the second Graph AxMSChart3.Column = 2 'Set that I want to edit the second graph AxMSChart3.Data = totStud Next End Sub Private Sub btnOverall_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnOverall.Click TotAverStudent() TotAverTeacher() createPieChart() AxMSChart3.Visible = True gbxPie.Visible = True End Sub Private Sub btnExit_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnExit.Click End End Sub End Class