John K. Alhassan

Work place: Federal University of Technology, Minna, Minna, Niger state, Nigeria



Research Interests: Computer Science & Information Technology, Human-Computer Interaction, Software Creation and Management, Computer systems and computational processes, Computer Architecture and Organization, Computer Networks, Data Mining, Database Management System, Data Structures and Algorithms


John K. Alhassan is a lecturer and current head of department of cyber security science, Federal University of Technology Minna, Minna, Niger State, Nigeria. Holds PhD in Computer Science. His area of research includes Artificial Intelligence, Data Mining, Internet Technology, Database Management System, Software Architecture, Machine Learning, Human Computer Interaction, Computer Security and Big Data Analytics.

Author Articles
Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria Limited

By Musbau D. Abdulrahaman John K. Alhassan Joseph A. Ojeniyi Shafii M. Abdulhamid

DOI:, Pub. Date: 8 Dec. 2018

Mobile wallet is a payment platform that stores money as a value in a digital account on mobile device which can then be used for payments with or without the need for the use credit/debit cards. The cases of cyber-attacks are on the rise, posing threats to the confidentiality, integrity and availability of information systems including the mobile wallet transactions. Due to the adverse impacts of cyber-attacks on the mobile payment service providers and the users, as well as the risks associated with the use of information systems, performing risk management becomes imperative for business organizations. This research work focuses on the assessment of the vulnerabilities associated with mobile wallet transactions and performs an empirical risk management in order to derive the security priority level needed to ensure the security and privacy of the users of mobile wallet platforms. Based on the extensive literature review, a structured questionnaire was designed and administered to the mobile wallet users who are Paga student customers via the internet. A total number of 52 respondents participated in the research and their responses were analyzed using descriptive statistics. The results of the analysis show that mobile wallet Login details are the most important part of customer information that need to be highly protected as their compromise is likely to affect others. Also, customers’ information such as Mobile Wallet Account Number, Registered Phone Number, Linked ATM Card details, and Linked ATM Card PIN among others are also plausible to attacks. Hence, different security priority levels were derived to safeguard each of the components and possible security tools and mechanisms are recommended. The study also revealed that there are vulnerabilities from the mobile wallet users end that also pose threat to the security of the payment system and customers’ transaction which need to be properly addressed. This research work will enable the mobile payment service providers focus on their services and prioritize the security solutions for each user’s information types or components base on the risks associated with their system and help in taking an inform security related decisions.

[...] Read more.
Comparative Analysis of Classification Algorithms for Email Spam Detection

By Shafii Muhammad Abdulhamid Maryam Shuaib Oluwafemi Osho Idris Ismaila John K. Alhassan

DOI:, Pub. Date: 8 Jan. 2018

The increase in the use of email in every day transactions for a lot of businesses or general communication due to its cost effectiveness and efficiency has made emails vulnerable to attacks including spamming. Spam emails also called junk emails are unsolicited messages that are almost identical and sent to multiple recipients randomly. In this study, a performance analysis is done on some classification algorithms including: Bayesian Logistic Regression, Hidden Na?ve Bayes, Radial Basis Function (RBF) Network, Voted Perceptron, Lazy Bayesian Rule, Logit Boost, Rotation Forest, NNge, Logistic Model Tree, REP Tree, Na?ve Bayes, Multilayer Perceptron, Random Tree and J48. The performance of the algorithms were measured in terms of Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operator Characteristics Area and Root Relative Squared Error using WEKA data mining tool. To have a balanced view on the classification algorithms’ performance, no feature selection or performance boosting method was employed. The research showed that a number of classification algorithms exist that if properly explored through feature selection means will yield more accurate results for email classification. Rotation Forest is found to be the classifier that gives the best accuracy of 94.2%. Though none of the algorithms did not achieve 100% accuracy in sorting spam emails, Rotation Forest has shown a near degree to achieving most accurate result.

[...] Read more.
Factors Militating against Successful Implementation of Computer Studies in 9-Year Universal Basic Education (UBE) Programme

By Garba Suleiman Solomon A. Adepoju John K. Alhassan

DOI:, Pub. Date: 8 May 2015

The application of Information and Communication Technology which is shaping and changing the world socially, educationally and economically cannot be over emphasized. In view of that, this paper looks at the factors militating against successful implementation of computer studies in 9-year Universal Basic Education (UBE) programmes. Five UBE schools were randomly selected for the research. Two research questions were postulated to guide the conduct of the research and t-test analysis was used for testing the hypotheses. The findings showed that there is positive perception by the students on factors militating against successful implementation of 9-year UBE programme. Based on the findings, some recommendations were made: provision of qualified teachers, instructional materials, provision of laboratories and so on in order to improve and ensure effective and efficient implementation of the 9-year Universal Basic (UBE) programme.

[...] Read more.
Effective Networking Model for Efficient Implementation of E-Governance: A Case Study of Nigeria

By Lauretta O. Osho Muhammad Bashir Abdullahi Oluwafemi Osho John K. Alhassan

DOI:, Pub. Date: 8 Jan. 2015

Nigeria is a nation full of potentials ranging from its human resources advantage to its mineral resources – the list is endless. Ambitious too, it has come to terms with the fact that ICT must be utilized even for the delivery of democracy dividends to actualize its vision of being among the top 20 economies by year 2020. In this paper, we explore the nation’s drive towards adopting e-governance by generally itemizing the requirements for e-governance, appraising how far Nigeria has gone in implementing it and then proposing a workable way to achieve it. Our study reveals that while the visions for e-government implementation are well articulated in terms of required components and intended deliverables, there are no clear statements on the processes of implementation. To this end, we propose some networking models adoptable towards realizing the different dimensions of e-government.

[...] Read more.
Other Articles