Skip to content

computers

Research

The Center provides support for the cybersecurity faculty for impactful, relevant and interdisciplinary research. Some of the recent published research are:

The “Right” recipes for security culture: a competing values model perspective

HJ Kam, T Mattson, DJ Kim
Information Technology & People, 2020 

Cultivating cybersecurity learning: An integration of self-determination and flow

HJ Kam, P Menard, D Ormond, RE Crossler
Computers & Security 96, 2020

Using Accountability Theory to Determine How Curiosity Affects Policy Compliance

P Menard, HJ Kam, D Ormond, RE Crossler
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2020

A cross industry study of institutional pressures on organizational effort to raise information security awareness

HJ Kam, T Mattson, S Goel
Information Systems Frontiers, 1-24, 2019

Enhancing student learning in cybersecurity education using an out-of-class learning approach

P Katerattanakul, HJ Kam
Journal of Information Technology Education: Innovations in Practice, 18, 2019

Improving Cybersecurity Learning: An Integration of Cyber Offense and Cyber Defense

HJ Kam, YY Shang
Proceeding of the Pacific Asia Conference on Information Systems (PACIS) 2019

Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches

D Ormond, HJ Kam, P Menard
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2019

Exploring Participants' Views of Cybersecurity Competitions through the Lens of Social Media

JI Bertrand, A Martakis, H Liu, C Zhong, J Yao
2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management

Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint

C Zhong, J Yen, P Liu
Adaptive Autonomous Secure Cyber Systems, 63-88, 2020 

Cybersecurity Education: From beginners to advanced players in cybersecurity competitions

LJ Thomas, M Balders, Z Countney, C Zhong, J Yao, C Xu
2019 IEEE International Conference on Intelligence and Security Informatics

AOH-map: A mind mapping system for supporting collaborative cyber security analysis

C Zhong, A Alnusair, B Sayger, A Troxell, J Yao
2019 IEEE Conference on Cognitive and Computational Aspects of Situation Management

Wearable Devices and Privacy Concerns: Data Collection, Analysis, and Interpretation

E Dincelli, X Zhou, A Yayla, H Jafarian
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps, 2021

Cyber Attack! A Story-driven Educational Hacking Game

E Dincelli, A Yayla, Ł Kusyk
16th Symposium on Usable Privacy and Security (SOUPS) 2020

A landmine or a goldmine? Identifying security concerns of browser-based cryptocurrency mining

E Dincelli, A Yayla
Proceedings of the European Conference on Information Systems (ECIS) 2020

Browser-based cryptocurrency mining as an alternative to online advertising: A view from the security vs. privacy perspective

A Yayla, E Dincelli
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2019

The dynamics of information security policy adoption

A Yayla, S Sarkar
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2019

Legitimization of Information Security Policies in Organizations

A Yayla, S Sarkar
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2019