Skip to main content

Research Articles

data-content-type=""
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Organizational science and cybersecurity

Organizational science and cybersecurity: abundant opportunities for research at the interface
RS Dalal, DJ Howard, RJ Bennett, C Posey, SJ Zaccaro, BJ Brummel
Journal of business and psychology, 1-29
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Security behavioral complexity

Insiders’ adaptations to security-based demands in the workplace: An examination of security behavioral complexity
AJ Burns, C Posey, TL Roberts
Information Systems Frontiers 23 (2), 343-360
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Secrecy coding

SECRECY CODING IN THE INTEGRATED NETWORK ENHANCED TELEMETRY (iNET)
M Shoushtari, W Harrison
TechRxiv
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Enumerating LDPC code block length

Enumeration of the degree distribution space for finite block length LDPC codes
S Giddens, MAC Gomes, JP Vilela, JL Santos, WK Harrison
ICC 2021-IEEE International Conference on Communications, 1-6
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Simulating Municipal Cybersecurity Incidents

Simulating Municipal Cybersecurity Incidents: Recommendations from Expert Interviews
Kira Gedris, Kayla Bowman, Aatish Neupane, Amanda Hughes, Elizabeth Bonsignore, Ryan West, Jon Balzotti, Derek Hansen
Proceedings of the 54th Hawaii International Conference on System Sciences, 2036
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Embedded Ethical Experiences: Designing Playable Case Studies for Ethics Education

Embedded Ethical Experiences: Designing Playable Case Studies for Ethics Education
DL Hansen, A Neupane, K Gedris
Co-Designing Resources for Ethics Education in HCI, ACM-CHI Workshop
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Keyed Polar Coding for Physical-Layer Security without Channel State Information

Keyed Polar Coding for Physical-Layer Security without Channel State Information
TMS Pinto, JP Vilela, MAC Gomes, WK Harrison
ICC 2021-IEEE International Conference on Communications, 1-6
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel

On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel
WK Harrison, M Shoushtari
2021 Wireless Telecommunications Symposium (WTS), 1-6
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security

SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security
A Silva, M Gomes, JP Vilela, WK Harrison
Sensors 21 (3), 856
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Cyber Due Diligence

Cyber Due Diligence
ET Jensen, S Watts
Oklahoma Law Review, 2021
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Increasing Cybersecurity Career Interest through Playable Case Studies

Increasing Cybersecurity Career Interest through Playable Case Studies
Justin Scott Giboney, Jason K McDonald, Jonathan Balzotti, Derek L Hansen, Desiree M Winters, Elizabeth Bonsignore
TechTrends, 1-15
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

The abacus

The abacus: A new architecture for policy-based authorization
J Siebach, J Giboney
Proceedings of the 54th Hawaii International Conference on System Sciences, 7055
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

A Social Engineering Victim Chatbot to Teach Adversarial Thinking

A Social Engineering Victim Chatbot to Teach Adversarial Thinking
J Giboney, R Schuetzler, M Grimes, I Dayley
Americas Conference on Information Systems, 2021
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

To Disclose or Not to Disclose

To Disclose or Not to Disclose: Examining the Privacy Decision-Making Processes of Older vs. Younger Adults
R Ghaiumy Anaraky, KA Byrne, PJ Wisniewski, X Page, B Knijnenburg
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

A Peek Into the DNS Cookie Jar

A Peek Into the DNS Cookie Jar
J Davis, C Deccio
Passive and Active Measurement: 22nd International Conference, PAM 2021
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=
data-content-type=""

Mitigating the security intention-behavior gap

Mitigating the security intention-behavior gap: The moderating role of required effort on the intention-behavior relationship
J Jenkins, A Durcikova, JF Nunamaker Jr
Journal of the Association for Information Systems 22 (1), 1
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=