My Publications
What i doMeasuring Cybersecurity Awareness of Students: a Study of State College Students Journal of Information Technology, Cybersecurity, and Artificial Intelligence
This study investigates the level of cybersecurity awareness and online security behavior among State College students, utilizing a 54-item structured questionnaire. The survey was administered online via Microsoft Forms over a period of 204 days, yielding 135 responses, of which 128 were retained after data cleaning and processing. https://doi.org/10.70715/jitcai.2025.v2.i3.030
Comprehensive Analysis and Detection of IoT Network Attacks Using Recon Host Discovery Traffic Dataset Journal of Information Technology, Cybersecurity, and Artificial Intelligence
The proliferation of Internet of Things (IoT) devices has introduced unparalleled interconnectivity and significant security challenges. Reconnaissance attacks, particularly Host Discovery, are often precursors to more severe cyber threats. In this study, we examine a labeled network traffic flow dataset to analyze patterns and identify key indicators of Recon Host Discovery attacks. https://doi.org/10.70715/jitcai.2024.v2.i1.003
Exploring Cybernetics Students' Perceptions of AI in Education: A Comprehensive Analytical Study Journal of Information Technology, Cybersecurity, and Artificial Intelligence
This study investigates the multifaceted perceptions of cybernetics students toward integrating artificial intelligence (AI) in educational environments. This research uncovers the students' knowledge levels, preferred sources of information, perceived benefits, and significant students through a comprehensive analysis of survey data combined with recent scholarly insights. https://doi.org/10.70715/jitcai.2024.v1.i1.006
The Impact of Generative AI on Student Engagement and Ethics in Higher Education Journal of Information Technology, Cybersecurity, and Artificial Intelligence
The rapid adoption of Artificial Intelligence (AI) in higher education is reshaping students’ learning experiences, with tools such as ChatGPT, Grammarly, and Microsoft Copilot becoming integral to academic work. https://doi.org/10.70715/jitcai.2024.v1.i1.004
Digital Crimes and Digital Terrorism: The New Frontier of Threats in Cyberspace Journal of Information Technology, Cybersecurity, and Artificial Intelligence
This paper explores the rise of digital crimes and digital terrorism as emerging threats that exploit cyberspace to conduct illegal activities, impact society, and compromise individuals’ privacy and security. With a growing dependency on digital platforms, these crimes have become more complex, highlighting the need for strengthened security measures, regulatory frameworks, and coordinated global efforts to address these issues. https://doi.org/10.70715/jitcai.2024.v1.i1.003
Counteracting Cybercrimes in Florida Journal of Information Technology, Cybersecurity, and Artificial Intelligence
This article explores Florida's high rate of cybercrime and the efforts being made to combat it. Florida has the second-highest rate of cybercrime events in the United States, with significant financial losses. The most frequent dangers are call center fraud, ransomware, investment fraud, and business email compromise. Strong defense tactics, including multi-factor authentication, safe password policies, cybersecurity training, frequent software upgrades, network segmentation, and dependable backups, are emphasized throughout the text. It also emphasizes the importance of efficient incident response procedures, promoting teamwork, and using continuous monitoring to lessen cyber threats. The essay discusses the vital role that international collaborations and law enforcement play in the battle against cybercrime. https://doi.org/10.70715/jitcai.2024.v1.i1.001
Cybersecurity and personal privacy: Protecting yourself in the digital age Open Access Research Journal of Science and Technology
The internet has revolutionized communication, work, and life, offering unprecedented opportunities and conveniences. However, as our dependence on the digital world grows, so do the risks to our personal information, privacy, and security. Cyberattacks, online harassment, and cyberstalking are no longer rare occurrences—they have become everyday threats that anyone can face. Understanding and implementing robust cybersecurity measures is essential for protecting yourself in this increasingly connected world. This article explores effective ways to safeguard against cyberattacks, respond to online harassment, prevent cyberstalking, and remove your personal information from websites that share it without your consent. https://doi.org/10.53022/oarjst.2024.12.1.0122
IMPACT OF INFORMATION SECURITY AWARENESS TRAINING ON EMPLOYEE ACTIONS IN ACADEMIC INSTITUTIONS National Association of African American Studies National Association of Hispanic and Latino Studies National Association of Native American Studies International Association of Asian Studies
In summary, the chapter offers a comprehensive exploration of cybersecurity in academic institutions, emphasizing the critical role of employee training and awareness. It provides valuable insights into the theoretical underpinnings of cybersecurity behavior, discusses the evolving landscape of cyber threats, and underscores the need for proactive strategies to combat these threats. The chapter serves as a crucial resource for ..
Digital Crimes and Our Society Academia Letters
The Internet and the open World Wide Web have opened a new Digital environment that gives the ability for everyone to express their needs and feelings. Thoughts freely allow businesses, companies, corporations, and other institutions to establish a digital representation of their business online, letting the institution, such as Academic and health institutions, publish through network data and information that should be kept confidential. Therefore, the governments established regulations and laws to ensure that businesses create a secure network for this information and the people's privacy. With this freedom, there will be groups or individuals like any society working to break these rules for a reason like collecting information to steal money through identity theft, scams, or no reason. Governments or terrorist groups support some groups that commit these crimes; to achieve this ideology, groups, and individuals use the internet to commit their crimes; for many reasons. This paper will cover the topic of Digital Crimes and Digital Terrorism topic, as this topic is one of the dominant topics by nature that affect people's lives. With the huge expansion of social networking, freedom of speech, and the right to express personal ideas available in these social networking websites and applications, the risk of getting attacked is much higher. These networking websites give criminals a good ground to launch attacks or target people. Including social networking, hacking groups and terrorist groups use the internet to exchange thoughts, plan for targeting locations, and communicate. https://doi.org/10.20935/AL4884
Impact of Training on Employee Actions and Information Security Awareness in Academic Institutions Northcentral University
Academic institutions hold important information about students, faculty, and staff members. Hackers target academic institutions to access this information for criminal activities such as identity theft. This study was conducted to examine information confidentiality and cybersecurity in academic institutions. It targeted employees’ training after recruitment and the ongoing training employees get during their employment at the academic institution. In this research, there are three variables: action insecure (AI), action secure (AS), and employee awareness (EA). Information security is the ultimate goal of the organization and its highest priority. The participants completed an online survey to determine employees’ secure and insecure actions. The survey collected information about the everyday activities of employees in their workplaces. The study’s research questions sought to determine 1) if there is a significant https://www.proquest.com/openview/2e682978834b2dc9435f92e92bc0d2d6/1?pq-origsite=gscholar&cbl=18750&diss=y
© 2026 Official Website of Dr. Ahmed Al Zaidy

