Current Research
The Center provides support for the cybersecurity faculty for impactful, relevant and interdisciplinary research. Some of the recently published research are:
Explainable artificial intelligence for smart grid intrusion detection systems.
A. Yayla, L. Haghnegahdar, E. Dincelli.
IT Professional,2022.
The Impact of Gamification on Students’ Learning Outcome and Career Interest in Cybersecurity Education.
Zhong, C., Kim, J.B. and Liu, H.
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2022
The Impact of Gamification on Students’ Learning Outcome and Career Interest in Cybersecurity Education.
Zhong, C., Kim, J.B. and Liu, H.
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2022
A Role Theory Perspective: Will Shifting Left Become a Pain for Application Developers?
HJ Kam, J D'Arcy
Pre-ICIS Workshop on Information Security and Privacy (SIGSEC), 2022
Curiosity vs. Curiosity: Striking the Balance between Positive and Negative Outcomes in SETA Programs and Phishing Campaigns
P Menard, HJ Kam, D Ormond, RE Crossler
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2022
Why Do Organizations Not Learn from Cybersecurity Crises? An Organizational Learning Perspective
HJ Kam, A Nehme, M Warkentin
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2022
Leading through the Crisis: What could CISOs do to Stop the Bleeding during a Cyberattack?
HJ Kam, A Nehme
AMCIS Proceeding 2022
That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training
HJ Kam, DK Ormond, P Menard, RE Crossler
Information Systems Journal, 2022
Should we wear a velvet glove to enforce Information security policies in higher education?
HJ Kam, DJ Kim, W He
Behaviour & Information Technology, 2022
Past Cybersecurity Faculty Research
To Err is Human, To Write Secure Codes is Divine: Promoting Application Security through Organizational Justice
HJ Kam, J D'Arcy, JB Kim, B Farkas
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2021
Understanding learners’ interests in cybersecurity competitions on reddit.
Floyd, B., Jackson, J., Probst, E., Liu, H., Mishra, N. and Zhong, C.
Proceedings of the 13th International Conference on Education Technology and Computers, 2021
FAIXID: A framework for enhancing ai explainability of intrusion detection results using data cleaning techniques.
Liu, H., Zhong, C., Alnusair, A. and Islam, S.R.
Journal of network and systems management, 2021
Wearable Devices and Privacy Concerns: Data Collection, Analysis, and Interpretation
E Dincelli, X Zhou,A Yayla, H Jafarian
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps, 2021
The “Right” recipes for security culture: a competing values model perspective
HJ Kam, T Mattson, DJ Kim
Information Technology & People, 2020
Cultivating cybersecurity learning: An integration of self-determination and flow
HJ Kam, P Menard, D Ormond, RE Crossler
Computers & Security 96, 2020
Using Accountability Theory to Determine How Curiosity Affects Policy Compliance
P Menard,HJ Kam, D Ormond, RE Crossler
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2020
Cyber Attack! A Story-driven Educational Hacking Game
E Dincelli,A Yayla, Ł Kusyk
16th Symposium on Usable Privacy and Security (SOUPS) 2020
A landmine or a goldmine? Identifying security concerns of browser-based cryptocurrency mining
E Dincelli,A Yayla
Proceedings of the European Conference on Information Systems (ECIS) 2020
Exploring Participants' Views of Cybersecurity Competitions through the Lens of Social Media
JI Bertrand, A Martakis, H Liu,C Zhong, J Yao
2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint
C Zhong, J Yen, P Liu
Adaptive Autonomous Secure Cyber Systems, 63-88, 2020
A cross industry study of institutional pressures on organizational effort to raise information security awareness
HJ Kam, T Mattson, S Goel
Information Systems Frontiers, 1-24, 2019
Enhancing student learning in cybersecurity education using an out-of-class learning approach
P Katerattanakul,HJ Kam
Journal of Information Technology Education: Innovations in Practice, 18, 2019
Improving Cybersecurity Learning: An Integration of Cyber Offense and Cyber Defense
HJ Kam, YY Shang
Proceeding of the Pacific Asia Conference on Information Systems (PACIS) 2019
Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches
D Ormond,HJ Kam, P Menard
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2019
Cybersecurity Education: From beginners to advanced players in cybersecurity competitions
LJ Thomas, M Balders, Z Countney,C Zhong, J Yao, C Xu
2019 IEEE International Conference on Intelligence and Security Informatics
AOH-map: A mind mapping system for supporting collaborative cyber security analysis
C Zhong, A Alnusair, B Sayger, A Troxell, J Yao
2019 IEEE Conference on Cognitive and Computational Aspects of Situation Management
Browser-based cryptocurrency mining as an alternative to online advertising: A view from the security vs. privacy perspective
A Yayla, E Dincelli
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2019
The dynamics of information security policy adoption
A Yayla, S Sarkar
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2019
Legitimization of Information Security Policies in Organizations
A Yayla, S Sarkar
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2019