skip to main content


Search for: All records

Creators/Authors contains: "Muhammad, Jean"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Anti-Virus Software is designed to keep your computer and other devices safe from viruses and other malware. Some popular free softwares that many people use are Norton, Kaspersky, Avira, and even more. If your device does get a virus, the software is supposed to isolate that file to prevent the file from infecting the rest of your device. To ensure that you are protected to the fullest extent, you must keep the anti-virus software up to date. But during that time that the anti-virus is getting updated, is it still keeping you safe? Many viruses get created every day, let alone every hour, so after your anti-virus is updated it’s already putting you at risk because those new viruses may not be in the update. All anti-virus software companies all claim to be the best frontline protectors, but this paper will see what anti-virus software will give you the best protection from viruses. 
    more » « less
    Free, publicly-accessible full text available April 6, 2025
  2. This report will discuss and explore the concept of reflexive control theory (RCT) in the context of day-to-day cybersecurity operations. Specifically, this study aims to investigate and emphasize the influential role of this trend in cyberspace while simultaneously examining the manipulative tactics employed by adversaries and RCT’s effect on the public. This report will further explain the concept of RCT and aims to promote awareness to educate the public about this topic. In the realm of cybersecurity, reflexive control serves as a potent weapon, used to allow adversaries to be able to exploit vulnerabilities, influence decision-making and essentially predict their target’s actions. This research will focus on three key concepts within reflexive control theory: Behavioral Analysis, Threat Detection and Perception Management. Furthermore, this report examines the ethical dimensions and potential risks associated with the reflexive control theory technique. These findings are intended to raise awareness and propose strategies to enhance resilience against these manipulative tactics. By meticulously synthesizing existing literature, research studies, and user surveys, this report provides a comprehensive analysis of the reflexive control theory in cyber operations. 
    more » « less
    Free, publicly-accessible full text available April 6, 2025
  3. This report will discuss implementing artificial intelligence in healthcare. Artificial Intelligence would be beneficial to healthcare because of the endless opportunities it provides. AI can be used to help detect and cure diseases, help patients with a path to treatment and even assist doctors with surgeries. Within this paper I will talk to you about the benefits of AI in healthcare and how it can be implemented using cyber security. In addition, I will conduct interviews with doctors and nurses to hear their perspective on AI in hospitals and how it is needed as well. As well as create a survey for nursing students at my university to see what their viewpoints are on adding AI unto the field of medicine. The best method to incorporate both user input and research into this paper is to use user input to back up the research. User input will be great addition because it gives the readers a real-world opinion on if this topic is valid. 
    more » « less
    Free, publicly-accessible full text available April 6, 2025
  4. This report will analyze issues related to web browser security and privacy. The web browser applications that will be looked at are Google Chrome, Bing, Mozilla Firefox, Internet Explorer, Microsoft Edge, Safari, and Opera. In recent months web browsers have increased the number of daily users. With the increase in daily users who may not be as well versed in data security and privacy, comes an increase in attacks. This study will discuss the pros and cons of each web browser, how many have been hacked, how often they have been hacked, why they have been hacked, security flaws, and more. The study utilizes research and a user survey to make a proper analysis and provide recommendations on the topic. 
    more » « less
  5. This paper will discuss the importance of video game anti-cheat and anti- “modding” software, which prevents users from modifying the games they play to give unfair advantages in multiplayer games. It will discuss the success of games that do and do not have an effective set of software necessary to prevent these intrusions and how that overall affects the success of the game and by extension the company. It will also look at the counter argument that a game can survive without it or fail with it. It will also discuss how it affects the game from both a player and business perspective. 
    more » « less
  6. Phishing Attacks, cybercrime in which a target(s) is contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data. The problem at stake is most people who use smartphones, tablets, and computers do not know how to protect themselves from phishing attacks, making themselves susceptible to data theft. This paper will use research of phishing attack types, what makes those more vulnerable to phishing attacks, and how to detect and report them. Additionally, I will interview a Department of Homeland Security employee working in cybersecurity as they have an insightful perspective on the problem. I will combine my research and in-person interview to conduct a literary search on the best methods to prevent and avoid phishing attacks for the average technology user to practice, especially children. This will give a valuable solution to the problem, decreasing the rate at which phishing attacks are successful. 
    more » « less
  7. This report will discuss biometric usage and its risks across different age groups in a time when biometric technologies continue to grow. This report will also discuss how different age groups utilize biometric systems, the advantages and disadvantages of these systems, and the affect it has on the identified population. Issues on biometrics on an ageing population will also be touched upon. This study utilizes surveys conducted to identify and compare the different ways the population uses biometrics and identify the risk associated with distinct usage. 
    more » « less