A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps SK Bang, S Chung, Y Choh, M Dupuis Proceedings of the 2nd annual conference on Research in information …, 2013 | 88 | 2013 |
An analysis of the use of amazon’s mechanical turk for survey research in the cloud M Dupuis, B Endicott-Popovsky, R Crossler ICCSM2013-Proceedings of the International Conference on Cloud Security …, 2013 | 43 | 2013 |
“I Got the Job!”: An exploratory study examining the psychological factors related to status updates on facebook M Dupuis, S Khadeer, J Huang Computers in Human Behavior 73, 132-140, 2017 | 31 | 2017 |
Measuring the Human Factor in Information Security and Privacy M Dupuis, R Crossler, B Endicott-Popovsky Hawaii International Conference on System Sciences (HICSS), 2016 | 23 | 2016 |
Is Digital Different?: How information creation, capture, preservation and discovery are being transformed M Moss, B Endicott-Popovsky, M Dupuis Facet Publishing, 2015 | 21 | 2015 |
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat MJ Dupuis, S Khadeer Research in Information Technology, 35-40, 2016 | 17 | 2016 |
The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals M Dupuis, R Crossler Proceedings of the 52nd Hawaii International Conference on System Sciences …, 2019 | 13 | 2019 |
The information security behavior of home users: Exploring a user’s risk tolerance and past experiences in the context of backing up information M Dupuis, R Crossler, B Endicott-Popovsky The Dewald Roode Information Security Workshop, 2012 | 13 | 2012 |
Cyber Security for Everyone: An Introductory Course for Non-Technical Majors MJ Dupuis Journal of Cybersecurity Education, Research and Practice 2017 (1), Article 3, 2017 | 11 | 2017 |
Effects of peer feedback on password strength M Dupuis, F Khan 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-9, 2018 | 8 | 2018 |
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised MJ Dupuis Research in Information Technology, 55-55, 2016 | 8 | 2016 |
Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations J Nguyen, M Dupuis The 20th Annual ACM Conference on Information Technology Education (SIGITE’19), 2019 | 6 | 2019 |
Cyber Security Fear Appeals: Unexpectedly Complicated K Renaud, M Dupuis New Security Paradigms Workshop (NSPW ’19), 15, 2019 | 5 | 2019 |
The Spread of Disinformation on the Web: An Examination of Memes on Social Networking M Dupuis, A Williams 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019 | 5 | 2019 |
Re-engineering the Cybersecurity Human Capital Crisis M Zantua, M Dupuis, B Endicott-Popovsky Special Edition of The Colloquium for Information Systems Security Education …, 2015 | 5 | 2015 |
Educating Consumers on the Security and Privacy of Internet of Things (IoT) Devices: A Quantifiable Security Compliance Measurement System to Aid in Purchasing Decisions M Khadeer, M Dupuis, S Khadeer Journal for The Colloquium for Information Systems Security Education 5 (2), 2018 | 4 | 2018 |
The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help? M Dupuis, T Geiger, M Slayton, F Dewing The 20th ACM Annual Conference on Information Technology Education (SIGITE ’19), 2019 | 3 | 2019 |
Cultural values, information sources, and perceptions of security RM Mason, MJ Dupuis iConference 2014 Proceedings, 2014 | 3 | 2014 |
The role of trait affect in the information security behavior of home users MJ Dupuis | 3 | 2014 |
Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion M Dupuis, B Endicott-Popovsky, H Wang, I Subramaniam, Y Du Asia Pacific Economic Association Conference, 2010 | 3 | 2010 |