Personal information

United States

Activities

Employment (3)

UNC Charlotte: Charlotte, NC, US

2021-08 to present | Professor (Software and Information Systems)
Employment
Source: Self-asserted source
Mohamed Shehab

UNC Charlotte: Charlotte, NC, US

2013-08 to 2021-08 | Associate Professor (Software and Information Systems)
Employment
Source: Self-asserted source
Mohamed Shehab

UNC Charlotte: Charlotte, NC, US

2007-08 to 2013-08 | Assistant Professor (Software and Information Systems)
Employment
Source: Self-asserted source
Mohamed Shehab

Education and qualifications (1)

Purdue University: West Lafayette, IN, US

2000-08-15 to 2007-08-05 | PhD (Electrical and Computer Engineering)
Education
Source: Self-asserted source
Mohamed Shehab

Works (50 of 103)

Items per page:
Page 1 of 3

Exploring End Users' Perceptions of Smart Lock Automation Within the Smart Home Environment

2024-09-30 | Conference paper
Contributors: Hussein Hazazi; Mohamed Shehab
Source: check_circle
Crossref

The Impact of Risk Appeal Approaches on Users’ Sharing Confidential Information

2024-05-11 | Conference paper
Contributors: Elham Al Qahtani; Peter Story; Mohamed Shehab
Source: check_circle
Crossref

I Have No Idea What Are These Terms! Exploring Users’ Understanding and Interpretation of Genealogy Results

2023 | Book chapter
Contributors: Lipsarani Sahoo; Mohamed Shehab
Source: check_circle
Crossref

Protect the Gate

2023-10-26 | Book chapter
Contributors: Hussein Hazazi; Mohamed Shehab
Source: check_circle
Crossref

"why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA

Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
2022 | Conference paper
EID:

2-s2.0-85132360355

Contributors: Al Qahtani, E.; Sahoo, L.; Javed, Y.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Nobody Wants My Stuff and It Is Just DNA Data, Why Should I Be Worried

2022 | Book chapter
Contributors: Lipsarani Sahoo; Mohamed Shehab; Elham Al Qahtani; Jay Dev
Source: check_circle
Crossref

You Know Too Much: Investigating Users’ Perceptions and Privacy Concerns Towards Thermal Imaging

2022 | Book chapter
Contributors: Lipsarani Sahoo; Nazmus Sakib Miazi; Mohamed Shehab; Florian Alt; Yomna Abdelrahman
Source: check_circle
Crossref

User Perceptions of Gmail’s Confidential Mode

Proceedings on Privacy Enhancing Technologies
2022-01-01 | Journal article
Part of ISSN: 2299-0984
Source: Self-asserted source
Mohamed Shehab

Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons

Human-Computer Interaction – INTERACT 2021
2021 | Book chapter
Part of ISBN: 9783030856151
Part of ISBN: 9783030856168
Part of ISSN: 0302-9743
Part of ISSN: 1611-3349
Source: Self-asserted source
Mohamed Shehab
grade
Preferred source (of 2)‎

Quantifying Information Exposure by Web Browsers

Advances in Intelligent Systems and Computing
2021 | Book
EID:

2-s2.0-85096490018

Part of ISSN: 21945365 21945357
Contributors: Mohsen, F.; Shehab, M.; Lange, M.; Karastoyanova, D.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

The Effectiveness of Video Messaging Campaigns to Use 2FA

HCI for Cybersecurity, Privacy and Trust
2021 | Book chapter
Part of ISBN: 9783030773915
Part of ISBN: 9783030773922
Part of ISSN: 0302-9743
Part of ISSN: 1611-3349
Source: Self-asserted source
Mohamed Shehab
grade
Preferred source (of 2)‎

Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework

Future Generation Computer Systems
2021-04 | Journal article
Part of ISSN: 0167-739X
Source: Self-asserted source
Mohamed Shehab
grade
Preferred source (of 2)‎

Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East

Future Internet
2021-01-03 | Journal article
Part of ISSN: 1999-5903
Source: Self-asserted source
Mohamed Shehab
grade
Preferred source (of 2)‎

A Study of South Asian Websites on Privacy Compliance

IEEE Access
2020 | Journal article
Part of ISSN: 2169-3536
Source: Self-asserted source
Mohamed Shehab
grade
Preferred source (of 2)‎

Closer look at mobile hybrid apps configurations: Statistics and implications

Lecture Notes in Networks and Systems
2020 | Book chapter
EID:

2-s2.0-85062904927

Part of ISSN: 23673389 23673370
Contributors: AlJarrah, A.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan

Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020
2020 | Conference paper
EID:

2-s2.0-85097107980

Contributors: Al Qahtani, E.; Javed, Y.; Lipford, H.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Effectiveness of a Theory-Based mHealth Intervention for High-Risk Drinking in College Students

Substance Use and Misuse
2020 | Journal article
EID:

2-s2.0-85084793992

Part of ISSN: 15322491 10826084
Contributors: Kazemi, D.M.; Borsari, B.; Levine, M.J.; Li, S.; Shehab, M.; Fang, F.; Norona, J.C.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

The Impact of Advertisements on User Attention During Permission Authorization

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020 | Book
EID:

2-s2.0-85092893627

Part of ISSN: 16113349 03029743
Contributors: Javed, Y.; Al Qahtani, E.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Bio-inspired approach to thwart against insider threats: An access control policy regulation framework

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2019 | Book
EID:

2-s2.0-85073896588

Part of ISSN: 18678211
Contributors: Rauf, U.; Shehab, M.; Qamar, N.; Sameen, S.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Privacy is the best policy: A framework for BLE beacon privacy management

Proceedings - International Computer Software and Applications Conference
2019 | Conference paper
EID:

2-s2.0-85072715054

Part of ISSN: 07303157
Contributors: Bello-Ogunu, E.; Shehab, M.; Miazi, N.S.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Seniors' Media Preference for Receiving Internet Security Information: A Pilot Study

arXiv
2019 | Other
EID:

2-s2.0-85095263593

Part of ISSN: 23318422
Contributors: Javed, Y.; Davis, B.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

The effectiveness of fear appeals in increasing smartphone locking behavior among Saudi Arabians

Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018
2019 | Conference paper
EID:

2-s2.0-85075932247

Contributors: Qahtani, E.A.; Shehab, M.; Aljohani, A.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Trust-Aware Goal Modeling from Use Case for Cooperative Self-Adaptive Systems

Proceedings - 2018 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2018
2019 | Conference paper
EID:

2-s2.0-85062214051

Contributors: Kim, M.-J.; Shehab, M.; Lee, H.-C.; Lee, S.-W.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Visual analysis of photo policy misconfigurations using treemaps

arXiv
2019 | Other
EID:

2-s2.0-85095221998

Part of ISSN: 23318422
Contributors: Javed, Y.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Real-time demonstration of a mHealth app designed to reduce college students hazardous drinking.

Psychological Services
2019-05 | Journal article
Contributors: Donna M. Kazemi; Brian Borsari; Maureen J. Levine; Mohamed Shehab; Monica Nelson; Beau Dooley; Betria Stinson; Fang Fang; Shaoyu Li
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Cordovaconfig: A tool for mobile hybrid apps’ configuration

ACM International Conference Proceeding Series
2018 | Conference paper
EID:

2-s2.0-85059978733

Contributors: AlJarrah, A.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Investigating temporal access in a flipped classroom: procrastination persists

International Journal of Educational Technology in Higher Education
2018 | Journal article
EID:

2-s2.0-85040461315

Part of ISSN: 23659440
Contributors: AlJarrah, A.; Thomas, M.K.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Mobile Users as Advertisers: User Perceptions of Product Sensitivity, Exposure, and Public Influence

ACM International Conference Proceeding Series
2018 | Conference paper
EID:

2-s2.0-85145875551

Contributors: Miazi, N.S.; Castro, C.A.C.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Hardening the OAuth-webview implementations in android applications by re-factoring the chromium library

Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016
2017 | Conference paper
EID:

2-s2.0-85013159235

Contributors: Mohsen, F.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Investigating user comprehension & risk perception of apple's touch ID technology

ACM International Conference Proceeding Series
2017 | Conference paper
EID:

2-s2.0-85030317198

Contributors: Javed, Y.; Shehab, M.; Bello-Ogunu, E.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications

Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017
2017 | Conference paper
EID:

2-s2.0-85046684825

Contributors: Mohsen, F.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Secure and private data aggregation for energy consumption scheduling in smart grids

IEEE Transactions on Dependable and Secure Computing
2017 | Journal article
EID:

2-s2.0-85021729436

Part of ISSN: 19410018 15455971
Contributors: Rahman, M.A.; Manshaei, M.H.; Al-Shaer, E.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

The demon is in the configuration: Revisiting hybrid mobile apps configuration model

ACM International Conference Proceeding Series
2017 | Conference paper
EID:

2-s2.0-85030308297

Contributors: Aljarrah, A.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

The design of cyber threat hunting games: A case study

2017 26th International Conference on Computer Communications and Networks, ICCCN 2017
2017 | Conference paper
EID:

2-s2.0-85032283475

Contributors: Miazi, M.N.S.; Pritom, M.M.A.; Shehab, M.; Chu, B.; Wei, J.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

The listening patterns to system events by benign and malicious android apps

Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016
2017 | Conference paper
EID:

2-s2.0-85013157672

Contributors: Mohsen, F.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications

Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017
2017 | Conference paper
EID:

2-s2.0-85046540288

Contributors: Javed, Y.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

A methodology for prevention of biometric presentation attacks

Proceedings - 7th Latin-American Symposium on Dependable Computing, LADC 2016
2016 | Conference paper
EID:

2-s2.0-85013218933

Contributors: Marasco, E.; Shehab, M.; Cukic, B.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Investigating the animation of application permission dialogs: A case study of facebook

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-84990057315

Part of ISSN: 16113349 03029743
Contributors: Javed, Y.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Investigating the keylogging threat in android - User perspective (Regular research paper)

Proceedings of the 2016 2nd Conference on Mobile and Secure Services, MOBISECSERV 2016
2016 | Conference paper
EID:

2-s2.0-84966473579

Contributors: Mohsen, F.; Bello-Ogunu, E.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Maintaining User Interface Integrity on Android

Proceedings - International Computer Software and Applications Conference
2016 | Conference paper
EID:

2-s2.0-84987940044

Part of ISSN: 07303157
Contributors: AlJarrah, A.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Semi-supervised policy recommendation for online social networks

Social Network Analysis and Mining
2016-12 | Journal article
Contributors: Mohamed Shehab; Hakim Touati; Yousra Javed
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks

IEEE Transactions on Dependable and Secure Computing
2015 | Journal article
EID:

2-s2.0-84929326090

Part of ISSN: 19410018 15455971
Contributors: Sultana, S.; Ghinita, G.; Bertino, E.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

E-mobile pilot for community-based dementia caregivers identifies desire for security

Gerontechnology
2015 | Journal article
EID:

2-s2.0-84930338017

Part of ISSN: 1569111X 15691101
Contributors: Davis, B.H.; Shehab, M.; Shenk, D.; Nies, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Towards a general framework for optimal role mining: A constraint satisfaction approach

Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
2015 | Conference paper
EID:

2-s2.0-84957658241

Contributors: Jafarian, J.H.; Takabi, H.; Touati, H.; Hesamifard, E.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Android system broadcast actions broadcasts your privacy

Proceedings of the ACM Conference on Computer and Communications Security
2014 | Conference paper
EID:

2-s2.0-84910597513

Part of ISSN: 15437221
Contributors: Mohsen, F.; Shehab, M.; Bello-Ogunu, E.; Al Jarrah, A.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Developing a pilot e-mobile app for dementia caregiver support: Lessons learned | OJNI

Online Journal of Nursing Informatics
2014 | Journal article
EID:

2-s2.0-84897944084

Part of ISSN: 10899758
Contributors: Davis, B.H.; Nies, M.A.; Shehab, M.; Shenk, D.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

E-mobile support for community-based dementia caregivers: A proof of concept phase 1

Gerontechnology
2014 | Journal article
EID:

2-s2.0-84929395914

Part of ISSN: 1569111X 15691101
Contributors: Davis, B.H.; Shenk, D.; Shehab, M.; Nies, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Human effects of enhanced privacy management models

IEEE Transactions on Dependable and Secure Computing
2014 | Journal article
EID:

2-s2.0-84898678716

Part of ISSN: 15455971
Contributors: Cheek, G.P.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

PERMITME: Integrating android permissioning support in the IDE

ETX 2014 - Proceedings of the 2014 ACM SIGPLAN Workshop on Eclipse Technology eXchange, Part of SPLASH 2014
2014 | Conference paper
EID:

2-s2.0-84922833241

Contributors: Bello-Ogunu, E.; Shehab, M.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier

Reducing attack surface on cordova-based hybrid mobile apps

MobileDeLi 2014 - Proceedings of the 2nd International Workshop on Mobile Development Lifecycle, Part of SPLASH 2014
2014 | Conference paper
EID:

2-s2.0-84921493129

Contributors: Shehab, M.; Aljarrah, A.
Source: Self-asserted source
Mohamed Shehab via Scopus - Elsevier
Items per page:
Page 1 of 3