A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps SK Bang, S Chung, Y Choh, M Dupuis Proceedings of the 2nd annual conference on Research in information …, 2013 | 113 | 2013 |
“I Got the Job!”: An exploratory study examining the psychological factors related to status updates on facebook M Dupuis, S Khadeer, J Huang Computers in Human Behavior 73, 132-140, 2017 | 80 | 2017 |
An analysis of the use of amazon’s mechanical turk for survey research in the cloud M Dupuis, B Endicott-Popovsky, R Crossler ICCSM2013-proceedings of the international conference on cloud security …, 2013 | 70 | 2013 |
Cyber Security Fear Appeals: Unexpectedly Complicated K Renaud, M Dupuis New Security Paradigms Workshop (NSPW ’19), 15, 2019 | 55 | 2019 |
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat MJ Dupuis, S Khadeer Research in Information Technology, 35-40, 2016 | 38 | 2016 |
Cyber Security for Everyone: An Introductory Course for Non-Technical Majors MJ Dupuis Journal of Cybersecurity Education, Research and Practice 2017 (1), Article 3, 2017 | 36 | 2017 |
Measuring the Human Factor in Information Security and Privacy M Dupuis, R Crossler, B Endicott-Popovsky Hawaii International Conference on System Sciences (HICSS), 2016 | 34 | 2016 |
The Spread of Disinformation on the Web: An Examination of Memes on Social Networking M Dupuis, A Williams 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019 | 32 | 2019 |
Shame in cyber security: effective behavior modification tool or counterproductive foil? K Renaud, R Searle, M Dupuis Proceedings of the 2021 New Security Paradigms Workshop, 70-87, 2021 | 29 | 2021 |
Is Digital Different?: How information creation, capture, preservation and discovery are being transformed M Moss, B Endicott-Popovsky, M Dupuis Facet Publishing, 2015 | 28 | 2015 |
Effects of peer feedback on password strength M Dupuis, F Khan 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-9, 2018 | 25 | 2018 |
Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations J Nguyen, M Dupuis The 20th Annual ACM Conference on Information Technology Education (SIGITE’19), 2019 | 23 | 2019 |
The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help? M Dupuis, T Geiger, M Slayton, F Dewing The 20th ACM Annual Conference on Information Technology Education (SIGITE ’19), 2019 | 21 | 2019 |
Help wanted: Consumer privacy behavior and smart home internet of things (iot) devices M Dupuis, M Ebenezer Proceedings of the 19th annual SIG conference on information technology …, 2018 | 20 | 2018 |
Scoping the ethical principles of cybersecurity fear appeals M Dupuis, K Renaud Ethics and Information Technology, 2020 | 18 | 2020 |
My Voiceprint Is My Authenticator: A Two-layer Authentication Approach Using Voiceprint for Voice Assistants YT Chang, M Dupuis 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019 | 17 | 2019 |
The information security behavior of home users: Exploring a user’s risk tolerance and past experiences in the context of backing up information M Dupuis, R Crossler, B Endicott-Popovsky The Dewald Roode Information Security Workshop, Provo, Utah, 2012 | 17 | 2012 |
Misinformation and disinformation in the era of covid-19: The role of primary information sources and the development of attitudes toward vaccination M Dupuis, K Chhor, N Ly Proceedings of the 22nd Annual Conference on Information Technology …, 2021 | 15 | 2021 |
The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals M Dupuis, R Crossler Proceedings of the 52nd Hawaii International Conference on System Sciences …, 2019 | 14 | 2019 |
Scaring people is not enough: an examination of fear appeals within the context of promoting good password hygiene M Dupuis, A Jennings, K Renaud Proceedings of the 22nd Annual Conference on Information Technology …, 2021 | 13 | 2021 |