ū컨

Skip to main content
computers

To Err is Human, To Write Secure Codes is Divine: Promoting Application Security through Organizational Justice

HJ Kam, J D'Arcy, JB Kim, B Farkas
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2021

Understanding learners’ interests in cybersecurity competitions on reddit.

Floyd, B., Jackson, J., Probst, E., Liu, H., Mishra, N. and Zhong, C.
Proceedings of the 13th International Conference on Education Technology and Computers, 2021

FAIXID: A framework for enhancing ai explainability of intrusion detection results using data cleaning techniques.

Liu, H., Zhong, C., Alnusair, A. and Islam, S.R.
Journal of network and systems management, 2021

Wearable Devices and Privacy Concerns: Data Collection, Analysis, and Interpretation

E Dincelli, X Zhou,A Yayla, H Jafarian
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps, 2021

The “Right” recipes for security culture: a competing values model perspective

HJ Kam, T Mattson, DJ Kim
Information Technology & People, 2020

Cultivating cybersecurity learning: An integration of self-determination and flow

HJ Kam, P Menard, D Ormond, RE Crossler
Computers & Security 96, 2020

Using Accountability Theory to Determine How Curiosity Affects Policy Compliance

P Menard,HJ Kam, D Ormond, RE Crossler
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2020

Cyber Attack! A Story-driven Educational Hacking Game

E Dincelli,A Yayla, Ł Kusyk
16th Symposium on Usable Privacy and Security (SOUPS) 2020

A landmine or a goldmine? Identifying security concerns of browser-based cryptocurrency mining

E Dincelli,A Yayla
Proceedings of the European Conference on Information Systems (ECIS) 2020

Exploring Participants' Views of Cybersecurity Competitions through the Lens of Social Media

JI Bertrand, A Martakis, H Liu,C Zhong, J Yao
2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management

Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint

C Zhong, J Yen, P Liu
Adaptive Autonomous Secure Cyber Systems, 63-88, 2020

A cross industry study of institutional pressures on organizational effort to raise information security awareness

HJ Kam, T Mattson, S Goel
Information Systems Frontiers, 1-24, 2019

Enhancing student learning in cybersecurity education using an out-of-class learning approach

P Katerattanakul,HJ Kam
Journal of Information Technology Education: Innovations in Practice, 18, 2019

Improving Cybersecurity Learning: An Integration of Cyber Offense and Cyber Defense

HJ Kam, YY Shang
Proceeding of the Pacific Asia Conference on Information Systems (PACIS) 2019

Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches

D Ormond,HJ Kam, P Menard
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2019

Cybersecurity Education: From beginners to advanced players in cybersecurity competitions

LJ Thomas, M Balders, Z Countney,C Zhong, J Yao, C Xu
2019 IEEE International Conference on Intelligence and Security Informatics

AOH-map: A mind mapping system for supporting collaborative cyber security analysis

C Zhong, A Alnusair, B Sayger, A Troxell, J Yao
2019 IEEE Conference on Cognitive and Computational Aspects of Situation Management

Browser-based cryptocurrency mining as an alternative to online advertising: A view from the security vs. privacy perspective

A Yayla, E Dincelli
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2019

The dynamics of information security policy adoption

A Yayla, S Sarkar
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2019

Legitimization of Information Security Policies in Organizations

A Yayla, S Sarkar
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2019