skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Muhammad, Jean"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. As mobile devices become increasingly integral to daily life, the need for robust security measures has intensified. Continuous user authentication (CUA) is an emerging paradigm designed to enhance security by verifying user identity throughout device usage, rather than solely at login. This study aims to explore user perceptions, experiences, and preferences concerning CUA methods, such as biometric scans (e.g., fingerprints, facial recognition) and behavioral analytics (e.g., typing patterns, swipe gestures). We will investigate the importance users place on continuous authentication for safeguarding personal data, as well as the usability challenges they encounter. Specifically, we will delve into how users perceive the reliability and accuracy of biometric and behavioral authentication methods, considering factors such as the perceived invasiveness of biometric scans and concerns about data privacy. Additionally, we will examine how perceptions and preferences for CUA vary across different age groups, as younger generations may be more accustomed to biometric authentication and less concerned about privacy implications, while older generations may have different preferences and concerns. The findings of this study will provide insights into user trust, privacy concerns, and the overall effectiveness of CUA in improving mobile security. By understanding user attitudes, this research seeks to inform the development of more intuitive and secure authentication solutions that align with user needs and expectations across various demographics. 
    more » « less
    Free, publicly-accessible full text available March 29, 2026
  2. Deepfake technology presents a significant challenge to cybersecurity. These highly sophisticated AI-generated manipulations can compromise sensitive information and erode public trust, privacy, and security. This has led to broader societal impacts, including decreased trust and confidence in digital communications. This paper will discuss public knowledge, understanding, and perception of AI-generated deepfakes, which was obtained through an online survey that measured people's ability to identify video, audio, and images of deepfakes. The findings will highlight the public's knowledge and perception of deepfakes, the risks that deepfake media presents, and the vulnerabilities to detection and prevention. This awareness will lead to stronger defense strategies and enhanced cybersecurity measures that will ultimately enhance deepfake detection technology and strengthen overall cybersecurity measures that will effectively mitigate exploitation risks and safeguard personal and organizational interests. 
    more » « less
    Free, publicly-accessible full text available March 29, 2026
  3. Anti-Virus Software is designed to keep your computer and other devices safe from viruses and other malware. Some popular free softwares that many people use are Norton, Kaspersky, Avira, and even more. If your device does get a virus, the software is supposed to isolate that file to prevent the file from infecting the rest of your device. To ensure that you are protected to the fullest extent, you must keep the anti-virus software up to date. But during that time that the anti-virus is getting updated, is it still keeping you safe? Many viruses get created every day, let alone every hour, so after your anti-virus is updated it’s already putting you at risk because those new viruses may not be in the update. All anti-virus software companies all claim to be the best frontline protectors, but this paper will see what anti-virus software will give you the best protection from viruses. 
    more » « less
  4. This report will discuss and explore the concept of reflexive control theory (RCT) in the context of day-to-day cybersecurity operations. Specifically, this study aims to investigate and emphasize the influential role of this trend in cyberspace while simultaneously examining the manipulative tactics employed by adversaries and RCT’s effect on the public. This report will further explain the concept of RCT and aims to promote awareness to educate the public about this topic. In the realm of cybersecurity, reflexive control serves as a potent weapon, used to allow adversaries to be able to exploit vulnerabilities, influence decision-making and essentially predict their target’s actions. This research will focus on three key concepts within reflexive control theory: Behavioral Analysis, Threat Detection and Perception Management. Furthermore, this report examines the ethical dimensions and potential risks associated with the reflexive control theory technique. These findings are intended to raise awareness and propose strategies to enhance resilience against these manipulative tactics. By meticulously synthesizing existing literature, research studies, and user surveys, this report provides a comprehensive analysis of the reflexive control theory in cyber operations. 
    more » « less
  5. This report will discuss implementing artificial intelligence in healthcare. Artificial Intelligence would be beneficial to healthcare because of the endless opportunities it provides. AI can be used to help detect and cure diseases, help patients with a path to treatment and even assist doctors with surgeries. Within this paper I will talk to you about the benefits of AI in healthcare and how it can be implemented using cyber security. In addition, I will conduct interviews with doctors and nurses to hear their perspective on AI in hospitals and how it is needed as well. As well as create a survey for nursing students at my university to see what their viewpoints are on adding AI unto the field of medicine. The best method to incorporate both user input and research into this paper is to use user input to back up the research. User input will be great addition because it gives the readers a real-world opinion on if this topic is valid. 
    more » « less
  6. This report will discuss biometric usage and its risks across different age groups in a time when biometric technologies continue to grow. This report will also discuss how different age groups utilize biometric systems, the advantages and disadvantages of these systems, and the affect it has on the identified population. Issues on biometrics on an ageing population will also be touched upon. This study utilizes surveys conducted to identify and compare the different ways the population uses biometrics and identify the risk associated with distinct usage. 
    more » « less
  7. This paper will discuss the importance of video game anti-cheat and anti- “modding” software, which prevents users from modifying the games they play to give unfair advantages in multiplayer games. It will discuss the success of games that do and do not have an effective set of software necessary to prevent these intrusions and how that overall affects the success of the game and by extension the company. It will also look at the counter argument that a game can survive without it or fail with it. It will also discuss how it affects the game from both a player and business perspective. 
    more » « less
  8. Phishing Attacks, cybercrime in which a target(s) is contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data. The problem at stake is most people who use smartphones, tablets, and computers do not know how to protect themselves from phishing attacks, making themselves susceptible to data theft. This paper will use research of phishing attack types, what makes those more vulnerable to phishing attacks, and how to detect and report them. Additionally, I will interview a Department of Homeland Security employee working in cybersecurity as they have an insightful perspective on the problem. I will combine my research and in-person interview to conduct a literary search on the best methods to prevent and avoid phishing attacks for the average technology user to practice, especially children. This will give a valuable solution to the problem, decreasing the rate at which phishing attacks are successful. 
    more » « less
  9. This report will analyze issues related to web browser security and privacy. The web browser applications that will be looked at are Google Chrome, Bing, Mozilla Firefox, Internet Explorer, Microsoft Edge, Safari, and Opera. In recent months web browsers have increased the number of daily users. With the increase in daily users who may not be as well versed in data security and privacy, comes an increase in attacks. This study will discuss the pros and cons of each web browser, how many have been hacked, how often they have been hacked, why they have been hacked, security flaws, and more. The study utilizes research and a user survey to make a proper analysis and provide recommendations on the topic. 
    more » « less