Organizational science and cybersecurity: abundant opportunities for research at the interface RS Dalal, DJ Howard, RJ Bennett, C Posey, SJ Zaccaro, BJ Brummel Journal of business and psychology, 1-29
Insiders’ adaptations to security-based demands in the workplace: An examination of security behavioral complexity AJ Burns, C Posey, TL Roberts Information Systems Frontiers 23 (2), 343-360
Enumeration of the degree distribution space for finite block length LDPC codes S Giddens, MAC Gomes, JP Vilela, JL Santos, WK Harrison ICC 2021-IEEE International Conference on Communications, 1-6
Simulating Municipal Cybersecurity Incidents: Recommendations from Expert Interviews Kira Gedris, Kayla Bowman, Aatish Neupane, Amanda Hughes, Elizabeth Bonsignore, Ryan West, Jon Balzotti, Derek Hansen Proceedings of the 54th Hawaii International Conference on System Sciences, 2036
Embedded Ethical Experiences: Designing Playable Case Studies for Ethics Education DL Hansen, A Neupane, K Gedris Co-Designing Resources for Ethics Education in HCI, ACM-CHI Workshop
Keyed Polar Coding for Physical-Layer Security without Channel State Information TMS Pinto, JP Vilela, MAC Gomes, WK Harrison ICC 2021-IEEE International Conference on Communications, 1-6
On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel WK Harrison, M Shoushtari 2021 Wireless Telecommunications Symposium (WTS), 1-6
Increasing Cybersecurity Career Interest through Playable Case Studies Justin Scott Giboney, Jason K McDonald, Jonathan Balzotti, Derek L Hansen, Desiree M Winters, Elizabeth Bonsignore TechTrends, 1-15
The abacus: A new architecture for policy-based authorization J Siebach, J Giboney Proceedings of the 54th Hawaii International Conference on System Sciences, 7055
A Social Engineering Victim Chatbot to Teach Adversarial Thinking J Giboney, R Schuetzler, M Grimes, I Dayley Americas Conference on Information Systems, 2021
To Disclose or Not to Disclose: Examining the Privacy Decision-Making Processes of Older vs. Younger Adults R Ghaiumy Anaraky, KA Byrne, PJ Wisniewski, X Page, B Knijnenburg Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
Mitigating the security intention-behavior gap: The moderating role of required effort on the intention-behavior relationship J Jenkins, A Durcikova, JF Nunamaker Jr Journal of the Association for Information Systems 22 (1), 1