Mathew Nicho

442 total citations
42 papers, 215 citations indexed

About

Mathew Nicho is a scholar working on Information Systems, Management Information Systems and Computer Networks and Communications. According to data from OpenAlex, Mathew Nicho has authored 42 papers receiving a total of 215 indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Information Systems, 13 papers in Management Information Systems and 12 papers in Computer Networks and Communications. Recurrent topics in Mathew Nicho's work include Information and Cyber Security (15 papers), Network Security and Intrusion Detection (12 papers) and Information Technology Governance and Strategy (12 papers). Mathew Nicho is often cited by papers focused on Information and Cyber Security (15 papers), Network Security and Intrusion Detection (12 papers) and Information Technology Governance and Strategy (12 papers). Mathew Nicho collaborates with scholars based in United Arab Emirates, United Kingdom and Australia. Mathew Nicho's co-authors include Faouzi Kamoun, Shafaq Khan, Nishara Nizamuddin, Munir Majdalawieh, Christopher D. McDermott, Tarek Gaber, Mohamed Torky, Zakaria Maamar, Muyideen AbdulRaheem and Nalin Asanka Gamagedara Arachchilage and has published in prestigious journals such as Sustainability, IEEE Internet of Things Journal and Communications of the Association for Information Systems.

In The Last Decade

Mathew Nicho

34 papers receiving 200 citations

Peers

Mathew Nicho
Nisha Rawindaran United Kingdom
Nicolas Mayer Luxembourg
Humza Naseer Australia
Nolan Shah United States
Andrew Fielder United Kingdom
Marie Vasek United Kingdom
Fariborz Farahmand United States
Nisha Rawindaran United Kingdom
Mathew Nicho
Citations per year, relative to Mathew Nicho Mathew Nicho (= 1×) peers Nisha Rawindaran

Countries citing papers authored by Mathew Nicho

Since Specialization
Citations

This map shows the geographic impact of Mathew Nicho's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mathew Nicho with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mathew Nicho more than expected).

Fields of papers citing papers by Mathew Nicho

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mathew Nicho. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mathew Nicho. The network helps show where Mathew Nicho may publish in the future.

Co-authorship network of co-authors of Mathew Nicho

This figure shows the co-authorship network connecting the top 25 collaborators of Mathew Nicho. A scholar is included among the top collaborators of Mathew Nicho based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mathew Nicho. Mathew Nicho is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Gaber, Tarek, et al.. (2025). Robust Attacks Detection Model for Internet of Flying Things Based on Generative Adversarial Network (GAN) and Adversarial Training. IEEE Internet of Things Journal. 12(13). 23961–23974. 4 indexed citations
3.
Gaber, Tarek, et al.. (2024). Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer. Journal of Information Security and Applications. 85. 103838–103838. 2 indexed citations
4.
McDermott, Christopher D., et al.. (2024). Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges. Open Access Institutional Repository at Robert Gordon University (Robert Gordon University). 10(1). 2 indexed citations
5.
Nicho, Mathew, et al.. (2024). Evaluating the cost of classifier discrimination choices for IoT sensor attack detection. International Journal of Computers and Applications. 46(11). 945–956. 1 indexed citations
6.
Oladipo, Idowu Dauda, et al.. (2023). A Secure and Scalable Behavioral Dynamics Authentication Model. International Journal of Advanced Computer Science and Applications. 14(8). 1 indexed citations
7.
Nicho, Mathew, et al.. (2023). Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective. International Journal of Advanced Computer Science and Applications. 14(4).
8.
Nicho, Mathew, et al.. (2023). A Crime Scene Reconstruction for Digital Forensic Analysis. International Journal of Digital Crime and Forensics. 15(1). 1–20.
9.
Nicho, Mathew, et al.. (2023). Evaluating Onsite and Online Internship Mode Using Consumptive Metrics. International Journal of Web-Based Learning and Teaching Technologies. 18(1). 1–25.
11.
Nicho, Mathew, et al.. (2022). Threat and Vulnerability Modelling of Malicious Human Interface Devices. The Eurasia Proceedings of Science Technology Engineering and Mathematics. 21. 241–247. 1 indexed citations
12.
Nicho, Mathew, et al.. (2019). Applying System Dynamics to Model Advanced Persistent Threats. 29–33. 1 indexed citations
13.
Nicho, Mathew & Shafaq Khan. (2017). IT Governance Measurement Tools and its Application in IT-Business Alignment. Journal of international technology and information management. 26(1). 81–111. 8 indexed citations
14.
Khan, Shafaq, Mathew Nicho, & Grahame Cooper. (2015). A Role Allocation Model For IT Controls In A Cloud Environment. Review of Business Information Systems (RBIS). 19(1). 5–14. 1 indexed citations
15.
Nicho, Mathew & Faouzi Kamoun. (2014). Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems. Communications of the Association for Information Systems. 35. 12 indexed citations
16.
Kamoun, Faouzi & Mathew Nicho. (2014). Human and Organizational Factors of Healthcare Data Breaches. International Journal of Healthcare Information Systems and Informatics. 9(1). 42–60. 23 indexed citations
17.
Nicho, Mathew, et al.. (2012). A Data Centric Security Cycle Model for Data Loss Prevention of Custodial Data and Company Intellectual Property. 134–141. 2 indexed citations
18.
Nicho, Mathew. (2012). An Optimized Dynamic Process Model of IS Security Governance Implementation. CONF-IRM. 38. 2 indexed citations
19.
Nicho, Mathew, et al.. (2011). An Integrated Security Governance Framework for Effective PCI DSS Implementation. International Journal of Information Security and Privacy. 5(3). 50–67. 3 indexed citations
20.
Nicho, Mathew. (2004). Implementation failures in customer relationship management software. 2(1). 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026