Research Articles
data-content-type=""
Passwords Are Meant to Be Secret
Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers
A Gautam, TK Yadav, K Seamons, S Ruoti
arXiv preprint arXiv:2402.06159, 2024
A Gautam, TK Yadav, K Seamons, S Ruoti
arXiv preprint arXiv:2402.06159, 2024
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Organizational science and cybersecurity
Organizational science and cybersecurity: abundant opportunities for research at the interface
RS Dalal, DJ Howard, RJ Bennett, C Posey, SJ Zaccaro, BJ Brummel
Journal of business and psychology, 1-29
RS Dalal, DJ Howard, RJ Bennett, C Posey, SJ Zaccaro, BJ Brummel
Journal of business and psychology, 1-29
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Security behavioral complexity
Insiders’ adaptations to security-based demands in the workplace: An examination of security behavioral complexity
AJ Burns, C Posey, TL Roberts
Information Systems Frontiers 23 (2), 343-360
AJ Burns, C Posey, TL Roberts
Information Systems Frontiers 23 (2), 343-360
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Secrecy coding
SECRECY CODING IN THE INTEGRATED NETWORK ENHANCED TELEMETRY (iNET)
M Shoushtari, W Harrison
TechRxiv
M Shoushtari, W Harrison
TechRxiv
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Enumerating LDPC code block length
Enumeration of the degree distribution space for finite block length LDPC codes
S Giddens, MAC Gomes, JP Vilela, JL Santos, WK Harrison
ICC 2021-IEEE International Conference on Communications, 1-6
S Giddens, MAC Gomes, JP Vilela, JL Santos, WK Harrison
ICC 2021-IEEE International Conference on Communications, 1-6
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Simulating Municipal Cybersecurity Incidents
Simulating Municipal Cybersecurity Incidents: Recommendations from Expert Interviews
Kira Gedris, Kayla Bowman, Aatish Neupane, Amanda Hughes, Elizabeth Bonsignore, Ryan West, Jon Balzotti, Derek Hansen
Proceedings of the 54th Hawaii International Conference on System Sciences, 2036
Kira Gedris, Kayla Bowman, Aatish Neupane, Amanda Hughes, Elizabeth Bonsignore, Ryan West, Jon Balzotti, Derek Hansen
Proceedings of the 54th Hawaii International Conference on System Sciences, 2036
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Embedded Ethical Experiences: Designing Playable Case Studies for Ethics Education
Embedded Ethical Experiences: Designing Playable Case Studies for Ethics Education
DL Hansen, A Neupane, K Gedris
Co-Designing Resources for Ethics Education in HCI, ACM-CHI Workshop
DL Hansen, A Neupane, K Gedris
Co-Designing Resources for Ethics Education in HCI, ACM-CHI Workshop
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Keyed Polar Coding for Physical-Layer Security without Channel State Information
Keyed Polar Coding for Physical-Layer Security without Channel State Information
TMS Pinto, JP Vilela, MAC Gomes, WK Harrison
ICC 2021-IEEE International Conference on Communications, 1-6
TMS Pinto, JP Vilela, MAC Gomes, WK Harrison
ICC 2021-IEEE International Conference on Communications, 1-6
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel
On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel
WK Harrison, M Shoushtari
2021 Wireless Telecommunications Symposium (WTS), 1-6
WK Harrison, M Shoushtari
2021 Wireless Telecommunications Symposium (WTS), 1-6
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security
SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security
A Silva, M Gomes, JP Vilela, WK Harrison
Sensors 21 (3), 856
A Silva, M Gomes, JP Vilela, WK Harrison
Sensors 21 (3), 856
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Cyber Due Diligence
Cyber Due Diligence
ET Jensen, S Watts
Oklahoma Law Review, 2021
ET Jensen, S Watts
Oklahoma Law Review, 2021
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Increasing Cybersecurity Career Interest through Playable Case Studies
Increasing Cybersecurity Career Interest through Playable Case Studies
Justin Scott Giboney, Jason K McDonald, Jonathan Balzotti, Derek L Hansen, Desiree M Winters, Elizabeth Bonsignore
TechTrends, 1-15
Justin Scott Giboney, Jason K McDonald, Jonathan Balzotti, Derek L Hansen, Desiree M Winters, Elizabeth Bonsignore
TechTrends, 1-15
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
The abacus
The abacus: A new architecture for policy-based authorization
J Siebach, J Giboney
Proceedings of the 54th Hawaii International Conference on System Sciences, 7055
J Siebach, J Giboney
Proceedings of the 54th Hawaii International Conference on System Sciences, 7055
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
A Social Engineering Victim Chatbot to Teach Adversarial Thinking
A Social Engineering Victim Chatbot to Teach Adversarial Thinking
J Giboney, R Schuetzler, M Grimes, I Dayley
Americas Conference on Information Systems, 2021
J Giboney, R Schuetzler, M Grimes, I Dayley
Americas Conference on Information Systems, 2021
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
To Disclose or Not to Disclose
To Disclose or Not to Disclose: Examining the Privacy Decision-Making Processes of Older vs. Younger Adults
R Ghaiumy Anaraky, KA Byrne, PJ Wisniewski, X Page, B Knijnenburg
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
R Ghaiumy Anaraky, KA Byrne, PJ Wisniewski, X Page, B Knijnenburg
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
A Peek Into the DNS Cookie Jar
A Peek Into the DNS Cookie Jar
J Davis, C Deccio
Passive and Active Measurement: 22nd International Conference, PAM 2021
J Davis, C Deccio
Passive and Active Measurement: 22nd International Conference, PAM 2021
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=
data-content-type=""
Mitigating the security intention-behavior gap
Mitigating the security intention-behavior gap: The moderating role of required effort on the intention-behavior relationship
J Jenkins, A Durcikova, JF Nunamaker Jr
Journal of the Association for Information Systems 22 (1), 1
J Jenkins, A Durcikova, JF Nunamaker Jr
Journal of the Association for Information Systems 22 (1), 1
overrideBackgroundColorOrImage=
overrideTextColor=
overrideTextAlignment=
overrideCardHideSection=
overrideCardHideByline=
overrideCardHideDescription=
overridebuttonBgColor=
overrideButtonText=
overrideTextAlignment=