Cyber security fear appeals: Unexpectedly complicated

K Renaud, M Dupuis - Proceedings of the new security paradigms …, 2019 - dl.acm.org
Cyber security researchers are starting to experiment with fear appeals, with a wide variety
of designs and reported efficaciousness. This makes it hard to derive recommendations for …

The spread of disinformation on the web: An examination of memes on social networking

MJ Dupuis, A Williams - … & Communications, Cloud & Big Data …, 2019 - ieeexplore.ieee.org
Social media has become a potent vector for political disinformation and propaganda, often
spread by malicious actors such as trolls or even foreign intelligence services, as famously …

Closing the feedback loop between UX design, software development, security engineering, and operations

J Nguyen, M Dupuis - Proceedings of the 20th Annual SIG Conference …, 2019 - dl.acm.org
There have been many evolutions of the software development lifecycle (SDLC). These
differing models have moved software development groups from sequential development to …

The use and non-use of cybersecurity tools among consumers: Do they want help?

M Dupuis, T Geiger, M Slayton, F Dewing - Proceedings of the 20th …, 2019 - dl.acm.org
Cybersecurity behavior changes over time, as do the recommendations for how one may
best protect themselves from cybersecurity threats. This paper examines current trends in …

My voiceprint is my authenticator: A two-layer authentication approach using voiceprint for voice assistants

YT Chang, MJ Dupuis - … & Communications, Cloud & Big Data …, 2019 - ieeexplore.ieee.org
Voice assistants are a ubiquitous service of contemporary daily life. Their intuitive use and
24-hour-a-day convenience make them popular with an increasing user base. However, the …

[PDF][PDF] I don't always spread disinformation on the web, but when i do i like to use memes: An examination of memes in the spread of disinformation

A Williams, M Dupuis - Proceedings of the 11th International …, 2020 - faculty.washington.edu
Social media has become a potent vector for the spread of disinformation. Content initially
posted by bots, trolls, or malicious actors is often picked up and magnified by ordinary users …

Clickthrough testing for real-world phishing simulations

MJ Dupuis, S Smith - Proceedings of the 21st Annual Conference on …, 2020 - dl.acm.org
In this paper, we begin by discussing the challenges associated with phishing email
simulations. In part, we note how challenging it is to achieve realism in such a simulation …

Exploring the Role of Service Personnels' Key Relationships in Military Cyber Resilience

F Kooner-Evans - 2024 - eprints.bournemouth.ac.uk
When creating an organisation with a strong Cybersecurity Culture, a consideration of
individuals' awareness, attitudes and values are key to building a workforce that is resilient …

Going Back for that One Last Thing in the House on Fire: How Fear, Attentiveness, Sadness, Joviality, and Other Lower Order Dimensions of Affect Influence Our …

MJ Dupuis - 2019 IEEE SmartWorld, Ubiquitous Intelligence & …, 2019 - ieeexplore.ieee.org
A digital transformation of society has taken place over the past couple of decades. From
digital cameras to social networks, we rely extensively on the digitization of our lives. Almost …

[图书][B] Understanding Individuals' IT Security Factors in Smartphone Usages: A Threat Avoidance Point of View

V Lautaha - 2021 - search.proquest.com
In the world of evolving technology, providing an understanding of the gap between the
individual's usage of smartphones and IT security factors is of paramount importance. Over …