Current Research
The Center provides support for the cybersecurity faculty for impactful, relevant and interdisciplinary research. Some of the recently published research are:
Explainable artificial intelligence for smart grid intrusion detection systems.听
A. Yayla, L. Haghnegahdar, E. Dincelli.
IT Professional,听2022.
The Impact of Gamification on Students鈥 Learning Outcome and Career Interest in Cybersecurity Education.
Zhong, C., Kim, J.B. and Liu, H.
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2022
The Impact of Gamification on Students鈥 Learning Outcome and Career Interest in Cybersecurity Education.
Zhong, C., Kim, J.B. and Liu, H.
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2022
A Role Theory Perspective: Will Shifting Left Become a Pain for Application Developers?
HJ Kam, J D'Arcy
Pre-ICIS Workshop on Information Security and Privacy (SIGSEC), 2022
Curiosity vs. Curiosity: Striking the Balance between Positive and Negative Outcomes in SETA Programs and Phishing Campaigns
P Menard, HJ Kam, D Ormond, RE Crossler
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2022
Why Do Organizations Not Learn from Cybersecurity Crises? An Organizational Learning Perspective
HJ Kam, A Nehme, M Warkentin
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2022
Leading through the Crisis: What could CISOs do to Stop the Bleeding during a Cyberattack?
HJ Kam, A Nehme
AMCIS Proceeding 2022
That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training
HJ Kam, DK Ormond, P Menard, RE Crossler
Information Systems Journal, 2022
Should we wear a velvet glove to enforce Information security policies in higher education?
HJ Kam, DJ Kim, W He
Behaviour & Information Technology, 2022
Past Cybersecurity Faculty Research
To Err is Human, To Write Secure Codes is Divine: Promoting Application Security through Organizational Justice
听
HJ Kam, J D'Arcy, JB Kim, B Farkas
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2021
听
Understanding learners鈥 interests in cybersecurity competitions on reddit.
听
Floyd, B., Jackson, J., Probst, E., Liu, H., Mishra, N. and Zhong, C.
Proceedings of the 13th International Conference on Education Technology and Computers, 2021
听
FAIXID: A framework for enhancing ai explainability of intrusion detection results using data cleaning techniques.
听
Liu, H., Zhong, C., Alnusair, A. and Islam, S.R.
Journal of network and systems management, 2021
听
Wearable Devices and Privacy Concerns: Data Collection, Analysis, and Interpretation
听
E Dincelli, X Zhou,听A Yayla, H Jafarian
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps, 2021
The 鈥淩ight鈥 recipes for security culture: a competing values model perspective
听
HJ Kam, T Mattson, DJ Kim
Information Technology & People, 2020
听
Cultivating cybersecurity learning: An integration of self-determination and flow
听
HJ Kam, P Menard, D Ormond, RE Crossler
Computers & Security 96, 2020
听
Using Accountability Theory to Determine How Curiosity Affects Policy Compliance
听
P Menard,听HJ Kam, D Ormond, RE Crossler
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2020
听
Cyber Attack! A Story-driven Educational Hacking Game
听
E Dincelli,听A Yayla, 艁 Kusyk
16th Symposium on Usable Privacy and Security (SOUPS) 2020
听
A landmine or a goldmine? Identifying security concerns of browser-based cryptocurrency mining
听
E Dincelli,听A Yayla
Proceedings of the European Conference on Information Systems (ECIS) 2020
听
Exploring Participants' Views of Cybersecurity Competitions through the Lens of Social Media
听
JI Bertrand, A Martakis, H Liu,听C Zhong, J Yao
2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management
听
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint
听
C Zhong, J Yen, P Liu
Adaptive Autonomous Secure Cyber Systems, 63-88, 2020
A cross industry study of institutional pressures on organizational effort to raise information security awareness
听
HJ Kam, T Mattson, S Goel
Information Systems Frontiers, 1-24, 2019
听
Enhancing student learning in cybersecurity education using an out-of-class learning approach
听
P Katerattanakul,听HJ Kam
Journal of Information Technology Education: Innovations in Practice, 18, 2019
听
Improving Cybersecurity Learning: An Integration of Cyber Offense and Cyber Defense
听
HJ Kam, YY Shang
Proceeding of the Pacific Asia Conference on Information Systems (PACIS) 2019
听
Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches
听
D Ormond,听HJ Kam, P Menard
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2019
听
Cybersecurity Education: From beginners to advanced players in cybersecurity competitions
听
LJ Thomas, M Balders, Z Countney,听C Zhong, J Yao, C Xu
2019 IEEE International Conference on Intelligence and Security Informatics
听
AOH-map: A mind mapping system for supporting collaborative cyber security analysis
听
C Zhong, A Alnusair, B Sayger, A Troxell, J Yao
2019 IEEE Conference on Cognitive and Computational Aspects of Situation Management
听
Browser-based cryptocurrency mining as an alternative to online advertising: A view from the security vs. privacy perspective
听
A Yayla, E Dincelli
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2019
听
The dynamics of information security policy adoption
听
A Yayla, S Sarkar
Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13 2019
听
Legitimization of Information Security Policies in Organizations
听
A Yayla, S Sarkar
Proceeding of the Americas' Conference on Information Systems (AMCIS) 2019