Book Chapters
Kamoun, Faouzi and Nicho, Mathew (2018). A new perspective on the swiss cheese model applied to understanding the anatomy of healthcare data breaches. Handbook of Research on Emerging Perspectives on Healthcare Information Systems and Informatics. (pp. 58-81) IGI Global. doi: 10.4018/978-1-5225-5460-8.ch004
Kamoun, Faouzi and Nicho, Mathew (2015). Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention. E-Health and Telemedicine: Concepts, Methodologies, Tools, and Applications. (pp. 1299-1319) IGI Global. doi: 10.4018/978-1-4666-8756-1.ch065
Journal Articles
Nicho, Mathew, Cusack, Brian, McDermott, Christopher D and Girija, Shini (2025). Assessing IoT intrusion detection computational costs when using a convolutional neural network. Information Security Journal, 1-21. doi: 10.1080/19393555.2025.2496327
Gaber, Tarek, Ali, Tarek, Nicho, Mathew and Torky, Mohamed (2025). Robust Attacks Detection Model for Internet of Flying Things based on Generative Adversarial Network (GAN) and Adversarial Training. IEEE Internet of Things Journal, PP (99), 1-1. doi: 10.1109/jiot.2025.3555202
Nicho, Mathew, Adelaiye, Oluwasegun, McDermott, Christopher D. and Girija, Shini (2025). Enhanced Detection of APT Vector Lateral Movement in Organizational Networks Using Lightweight Machine Learning. Computers, Materials & Continua, 1-10. doi: 10.32604/cmc.2025.059597
Gaber, Tarek, Nicho, Mathew, Ahmed, Esraa and Hamed, Ahmed (2024). Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer. Journal of Information Security and Applications, 85 103838, 103838. doi: 10.1016/j.jisa.2024.103838
Ray, Geraldine, McDermott, Christopher D. and Nicho, Mathew (2024). Cyberbullying on social media: definitions, prevalence, and impact challenges. Journal of Cybersecurity, 10 (1) tyae026, 1-18. doi: 10.1093/cybsec/tyae026
Nicho, Mathew, Parkar, Tarannum and Girija, Shini (2023). Evaluating Onsite and Online Internship Mode Using Consumptive Metrics. International Journal of Web-Based Learning and Teaching Technologies, 18 (1), 1-25. doi: 10.4018/ijwltt.332244
Nicho, Mathew, Alblooki, Maha, AlMutiwei, Saeed, McDermott, Christopher D. and Ilesanmi, Olufemi (2023). A Crime Scene Reconstruction for Digital Forensic Analysis : An SUV Case Study. International Journal of Digital Crime and Forensics, 15 (1), 1-20. doi: 10.4018/ijdcf.327358
Khan, Shafaq, Shael, Mohammed, Majdalawieh, Munir, Nizamuddin, Nishara and Nicho, Mathew (2022). Blockchain for governments: the case of the Dubai government. Sustainability, 14 (11) 6576, 6576. doi: 10.3390/su14116576
Muammar, Suadad and Nicho, Mathew (2019). IT governance practices in the Gulf Cooperation Council region. International Journal of Information Technology Project Management, 10 (4), 137-159. doi: 10.4018/IJITPM.2019100106
Khan, Shafaq Naheed, Nicho, Mathew, Takruri, Haifa, Maamar, Zakaria and Kamoun, Faouzi (2019). Role assigning and taking in cloud computing. Human Systems Management, 38 (1), 1-27. doi: 10.3233/HSM-180336
Nicho, Mathew (2018). A process model for implementing information systems security governance. Information and Computer Security, 26 (1), 10-38. doi: 10.1108/ICS-07-2016-0061
Khan, Shafaq, Nicho, Mathew and Takruri, Haifa (2016). IT controls in the public cloud: Success factors for allocation of roles and responsibilities. Journal of Information Technology Case and Application Research, 18 (3), 155-180. doi: 10.1080/15228053.2016.1237218
Nicho, Mathew and Kamoun, Faouzi (2014). Multiple case study approach to identify aggravating variables of insider threats in information systems. Communications of the Association for Information Systems, 35 18, 333-356. doi: 10.17705/1cais.03518
Kamoun, Faouzi and Nicho, Mathew (2014). Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention. International Journal of Healthcare Information Systems and Informatics, 9 (1), 42-60. doi: 10.4018/ijhisi.2014010103
Nicho, Mathew and Khan, Shafaq (2014). Identifying vulnerabilities of advanced persistent threats: An organizational perspective. International Journal of Information Security and Privacy, 8 (1), 1-18. doi: 10.4018/ijisp.2014010101
Nicho, Mathew and Fakhry, Hussein (2013). Using COBIT 5 for data breach prevention. ISACA Journal, 5, 23-30.
Nicho, Mathew (2012). Incorporating COBIT best practices in PCI DSS V2.0 for effective compliance. ISACA Journal, 1.
Nicho, Mathew and Mourad, Basel A I (2012). Success Factors for Integrated Itil Deployment: An it Governance Classification. Journal of Information Technology Case and Application Research, 14 (1), 25-54. doi: 10.1080/15228053.2012.10845694
Nicho, Mathew and Fakhry, Hussein (2011). An integrated security governance framework for effective PCI DSS implementation. International Journal of Information Security and Privacy, 5 (3), 50-67. doi: 10.4018/jisp.2011070104
Conference Papers
Nicho, Mathew and Sabry, Ibrahim (2023). Bypassing multiple security layers using malicious USB human interface device. 9th International Conference on Information Systems Security and Privacy, Lisbon, Portugal, 22-24 February 2023. Setúbal, Portugal: Science and Technology Publications. doi: 10.5220/0011677100003405
Nicho, Mathew and Girija, Shini (2022). Systems dynamics modeling for evaluating socio-technical vulnerabilities in advanced persistent threats. 2022 15th International Conference on Human System Interaction (HSI), Melbourne, VIC Australia, 28-31 July 2022. Piscataway, NJ USA: IEEE Computer Society. doi: 10.1109/HSI55341.2022.9869450
Nicho, Mathew and Girija, Shini (2022). Evaluating machine learning methods for intrusion detection in IoT. 12th International Conference on Information Communication and Management, London, United Kingdom, 13-15 July 2022. New York, NY USA: Association for Computing Machinery. doi: 10.1145/3551690.3551692
Nicho, Mathew, Bataineh, Emad and Parkar, Tarannum (2022). Application of consumptive metrics to measure internship alignment. 2021 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV USA, 15-17 December 2021. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/CSCI54926.2021.00214
Nicho, Mathew, Majdani, Farzan and McDermott, Christopher D. (2022). Replacing human input in spam email detection using deep learning. 3rd International Conference, AI-HCI 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual, 26 June-1July 2022. Cham, Switzerland: Springer Cham. doi: 10.1007/978-3-031-05643-7_25
Nicho, Mathew and Alkhateri, Maitha (2021). Modeling evasive malware authoring techniques. 2021 5th Cyber Security in Networking Conference (CSNet), Abu Dhabi, United Arab Emirates, 12-14 October 2021. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/CSNet52717.2021.9614645
Nicho, Mathew and Muamaar, Suadad (2020). Evaluating IT governance structure implementation in the Gulf Cooperation Council region. 2019 International Conference on Advanced Information Systems and Engineering, Cairo, Egypt, 23-25 August 2019. Bristol, United Kingdom: Institute of Physics Publishing. doi: 10.1088/1742-6596/1454/1/012005
Nicho, Mathew and Fakhry, Hussein (2019). Applying system dynamics to model advanced persistent threats. Association for Computing Machinery. doi: 10.1145/3380678.3380682
Nicho, Mathew and McDermott, Christopher D. (2019). Dimensions of 'socio' vulnerabilities of advanced persistent threats. Institute of Electrical and Electronics Engineers Inc.. doi: 10.23919/SOFTCOM.2019.8903788
Nicho, Mathew and Khan, Shafaq Naheed (2018). A decision matrix model to identify and evaluate APT vulnerabilities at the user plane. Institute of Electrical and Electronics Engineers Inc.. doi: 10.23919/MIPRO.2018.8400210
Nicho, Mathew, Oluwasegun, Adelaiye and Kamoun, Faouzi (2018). Identifying vulnerabilities in APT Attacks: A simulated approach. Institute of Electrical and Electronics Engineers Inc.. doi: 10.1109/NTMS.2018.8328696
Nicho, Mathew, Fakhry, Hussein and Egbue, Uche (2018). When spear phishers craft contextually convincing emails. IADIS Press.
Nicho, Mathew, Khan, Shafaq and Rahman, M. S.M.K. (2017). Managing Information Security Risk Using Integrated Governance Risk and Compliance. Institute of Electrical and Electronics Engineers Inc.. doi: 10.1109/COMAPP.2017.8079741
Mavroeidis, Vasileios and Nicho, Mathew (2017). Quick response code secure: A cryptographically secure anti-phishing tool for QR code attacks. Springer Verlag. doi: 10.1007/978-3-319-65127-9_25
Nicho, Mathew and Cusack, Brian (2007). A metrics generation model for measuring the control objectives of information systems audit. doi: 10.1109/HICSS.2007.21