Education
PhD in Cognitive Computing (2011)
INTEGRATING A USABLE SECURITY PROTOCOL FOR USER AUTHENTICATION IN THE REQUIREMENTS AND DESIGN PROCESS
Specialization: Usable Security
University of Quebec
Department of Computer Science and Department of Philosophy
Montreal, Quebec, Canada.
Cognitive Computing refers to the development of computer systems modeled after the human brain. It is the multidisciplinary study of cognition and information sciences, which investigates human information processing mechanisms and processes and their engineering applications in computing. It includes areas such as artificial intelligence, human computer interaction, artificial life, data communication, computer supported learning, information search, and information visualization.
Courses
Knowledge Engineering: Advanced knowledge engineering techniques that have evolved from past expert system projects. Build and document an expert system that addresses a real-world problem.
Semantic Web: The Semantic Web intends to create a universal medium for information exchange by giving meaning, in a manner understandable by machines, to the content of documents on the Web.
Intelligent Tutorial Systems (ITS): An ITS is a computer program which uses artificial intelligence techniques to simulate human thinking in a certain domain, attempting to help an "apprentice" in building strategies to solve problems or take decisions.
Fundamental Concepts in Cognitive Informatics: Theoretical foundations of the main formalisms for knowledge representation and reasoning, to show how they can be used in practice. Particular attention will be given to logic-based formalisms, and to comparing and translating between different approaches.
Cognitive Computing Seminars I and II: It covers a range of topics broadly related to computer science and cognition.
Introduction to Cognitive Sciences: Introduction and interdisciplinary program of study, drawing upon courses from computer science, linguistics, philosophy, psychology, neuroscience, and other fields that address the nature of the mind and brain.
Logic and Functional Programming: Functional programming starts with nested function applications, as found in most programming languages, and leads to powerful higher-order and concurrent languages (Lisp). Logic programming starts with Horn-logic facts and rules and leads to logic markup languages for business rules (Prolog). This course will treat the core of functional and logic programming in an integrated manner as an example of declarative programming.
Human Computer Interface Design: Introduction to human computer interaction. User-centered design process. Analysis of user needs. User modeling. Task analysis. Graphical User Interface (GUI) design principles, guidelines and patterns. Tools for user interface prototyping. User interface testing and evaluation. Large project on GUI design, prototyping, and evaluation in a team oriented environment.
Cognitive Ergonomics: Cognitive Ergonomics, also known as Cognitive Engineering, is an engineering discipline that is concerned with supporting cognitive work. The aim of the intervention can be the design of an artifact, a training program, or work redesign. Cognitive Ergonomics mainly focuses on work activities having: an emphasized cognitive component (e.g. calculation, decision making), safety-critical environments, and operating in a complex, changing environment.
Ergonomics in Process Control: The goal is to identify potential ergonomics problems and to understand the underlying psychological or physiological issues. Thus, propose practical solutions that will reduce the risk of human error, increase safety and improve human performance.
Statistical Planning and Analysis of Experiments: It provides knowledge about experimental designs and analysis of data from experiments. Analysis of variance, randomized block designs, Latin square designs, linear regression models, factorial experiments (such as split-plot designs, etc.), confounding in the 2k factorial design, fractional 2k experiments, 3k factorial design, response surface methodology are studied. Applications of experimental planning and analysis of variance play a prominent part. This course is valuable when planning and carrying through experiments.
Master of Science in Electronic Commerce (2004)
A USER-CENTERED MOBILE RFID-BASED AUTHENTICATION SYSTEM FOR A SECURE ACCESS
Specialization: Computer Science
University of Montreal
Department of Computer Science and Operational Research
Montreal, Quebec, Canada
I envision an environment where humans network (intercommunicate) continually and securely with mobile devices without providing additional authentication credentials such as passwords, PINs (Personal Identification Numbers), biometrics, challenge-response, or any other existing authentication systems. In this research project, I propose a new mobile authentication system called AUTHENLINK coupled with a new approach to distinguishing characteristics to authenticate people (authentication factor): something you CONVEY.
The utmost purpose of this research is to provide a hassle-free, user-centered, and secure authentication system against fraud, counterfeit, and theft specifically targeted to high-level security applications or facilities such as space, military and defense, high-end engineering corporations, corporate security, research centers, and so on. AuthenLink achieves its goal through a microprocessor chip (ChipTag) implanted under human skin. This ChipTag is able to authenticate user's access to systems, connect them wirelessly through Radio Frequency Identification (RFID). It enables users perform mobile transactions, for instance, an Administrator runs a remote wipe command for a lost or stolen mobile device or simply access confidential files in the company's network. This experiment may have large-scale implications for employers and for society in general, as humans define how closely they want to be connected with mobile devices.
This program includes instruction in information technology, information resources management, Web design and programming, computer and Internet law and policy, computer privacy and security, and product and service networking, and computer networking.
Courses
Introduction to Law, Introduction to Management, Introduction to Electronic Commerce, Digital Economy, Electronic Commerce and Law, Electronic Commerce Technologies, Computer Security, Artificial Intelligence, Software Engineering in Electronic Commerce, Electronic Commerce - Multidisciplinary Synthesis Workshop, and Master Thesis Dissertation.