Marc Dupuis
Cited by
Cited by
A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps
SK Bang, S Chung, Y Choh, M Dupuis
Proceedings of the 2nd annual conference on Research in information …, 2013
An analysis of the use of amazon’s mechanical turk for survey research in the cloud
M Dupuis, B Endicott-Popovsky, R Crossler
ICCSM2013-Proceedings of the International Conference on Cloud Security …, 2013
“I Got the Job!”: An exploratory study examining the psychological factors related to status updates on facebook
M Dupuis, S Khadeer, J Huang
Computers in Human Behavior 73, 132-140, 2017
Measuring the Human Factor in Information Security and Privacy
M Dupuis, R Crossler, B Endicott-Popovsky
Hawaii International Conference on System Sciences (HICSS), 2016
Is Digital Different?: How information creation, capture, preservation and discovery are being transformed
M Moss, B Endicott-Popovsky, M Dupuis
Facet Publishing, 2015
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat
MJ Dupuis, S Khadeer
Research in Information Technology, 35-40, 2016
The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals
M Dupuis, R Crossler
Proceedings of the 52nd Hawaii International Conference on System Sciences …, 2019
The information security behavior of home users: Exploring a user’s risk tolerance and past experiences in the context of backing up information
M Dupuis, R Crossler, B Endicott-Popovsky
The Dewald Roode Information Security Workshop, 2012
Cyber Security for Everyone: An Introductory Course for Non-Technical Majors
MJ Dupuis
Journal of Cybersecurity Education, Research and Practice 2017 (1), Article 3, 2017
Effects of peer feedback on password strength
M Dupuis, F Khan
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-9, 2018
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised
MJ Dupuis
Research in Information Technology, 55-55, 2016
Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations
J Nguyen, M Dupuis
The 20th Annual ACM Conference on Information Technology Education (SIGITE’19), 2019
Cyber Security Fear Appeals: Unexpectedly Complicated
K Renaud, M Dupuis
New Security Paradigms Workshop (NSPW ’19), 15, 2019
The Spread of Disinformation on the Web: An Examination of Memes on Social Networking
M Dupuis, A Williams
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019
Re-engineering the Cybersecurity Human Capital Crisis
M Zantua, M Dupuis, B Endicott-Popovsky
Special Edition of The Colloquium for Information Systems Security Education …, 2015
Educating Consumers on the Security and Privacy of Internet of Things (IoT) Devices: A Quantifiable Security Compliance Measurement System to Aid in Purchasing Decisions
M Khadeer, M Dupuis, S Khadeer
Journal for The Colloquium for Information Systems Security Education 5 (2), 2018
The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?
M Dupuis, T Geiger, M Slayton, F Dewing
The 20th ACM Annual Conference on Information Technology Education (SIGITE ’19), 2019
Cultural values, information sources, and perceptions of security
RM Mason, MJ Dupuis
iConference 2014 Proceedings, 2014
The role of trait affect in the information security behavior of home users
MJ Dupuis
Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion
M Dupuis, B Endicott-Popovsky, H Wang, I Subramaniam, Y Du
Asia Pacific Economic Association Conference, 2010
The system can't perform the operation now. Try again later.
Articles 1–20