Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Cybersecurity

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 31

Full-Text Articles in Social and Behavioral Sciences

Repetition Of Computer Security Warnings Results In Differential Repetition Suppression Effects As Revealed With Functional Mri, C. Brock Kirwan, Daniel K. Bjornn, Bonnie Brinton Anderson, Anthony Vance, David Eargle, Jeffrey L. Jenkins Dec 2020

Repetition Of Computer Security Warnings Results In Differential Repetition Suppression Effects As Revealed With Functional Mri, C. Brock Kirwan, Daniel K. Bjornn, Bonnie Brinton Anderson, Anthony Vance, David Eargle, Jeffrey L. Jenkins

Faculty Publications

Computer users are often the last line of defense in computer security. However, with repeated exposures to system messages and computer security warnings, neural and behavioral responses show evidence of habituation. Habituation has been demonstrated at a neural level as repetition suppression where responses are attenuated with subsequent repetitions. In the brain, repetition suppression to visual stimuli has been demonstrated in multiple cortical areas, including the occipital lobe and medial temporal lobe. Prior research into the repetition suppression effect has generally focused on a single repetition and has not examined the pattern of signal suppression with repeated exposures. We used …


The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker Dec 2020

The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker

Psychology Theses & Dissertations

The current study examined the effects of security system framing, time pressure, and brand familiarity on mobile application download behaviors, with an emphasis on risk taking. According to the Prospect Theory, people tend to engage in irrational decision making, and make qualitatively different decisions when information is framed in terms of gains and losses (i.e., the framing effect). Past research has used this framing effect to guide the design of a risk display for mobile applications (apps), with the purpose of communicating the potential risks and minimizing insecure app selections. Time pressure has been shown to influence the framing effect …


Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib Nov 2020

Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib

USF Tampa Graduate Theses and Dissertations

Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.

To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …


Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade Nov 2020

Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

Academic institutions house enormous amounts of critical information from social security numbers of students to proprietary research data. Thus, maintaining up to date cybersecurity practices to protect academic institutions’ information and facilities against cyber-perpetrators has become a top priority. The purpose of this study is to assess common cybersecurity measures through a situational crime prevention (SCP) theoretical framework. Using a national data set of academic institutions in the United States, this study investigates the link between common cybersecurity measures, crime prevention activities, and cybercrimes. By focusing on the conceptualization of cybersecurity measures as SCP techniques, this study also offers the …


Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong Nov 2020

Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong

International Journal of Cybersecurity Intelligence & Cybercrime

This paper discusses and proposes the inclusion of a cyber or security risk assessment section during the course of public health initiatives involving the use of information and communication computer technology. Over the last decade, many public health research efforts have included information technologies such as Mobile Health (mHealth), Electronic Health (eHealth), Telehealth, and Digital Health to assist with unmet global development health needs. This paper provides a background on the lack of documentation on cybersecurity risks or vulnerability assessments in global public health areas. This study suggests existing frameworks and policies be adopted for public health. We also propose …


Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee Nov 2020

Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through …


Students Conduct Cybersecurity Research For Lockheed Martin, Mark D. Weinstein Oct 2020

Students Conduct Cybersecurity Research For Lockheed Martin, Mark D. Weinstein

News Releases

Lockheed Martin awarded a grant to Cedarville University’s Center for the Advancement of Cybersecurity to conduct proprietary cybersecurity-related research during the 2020 calendar year.


Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas Sep 2020

Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas

Mineta Transportation Institute

The intent of this study is to assess the readiness, resourcing, and structure of public transit agencies to identify, protect from, detect, respond to, and recover from cybersecurity vulnerabilities and threats. Given the multitude of connected devices already in use by the transit industry and the vast amount of data generated (with more coming online soon), the transit industry is vulnerable to malicious cyber-attack and other cybersecurity-related threats. This study reviews the state of best cybersecurity practices in public surface transit; outlines U.S. public surface transit operators’ cybersecurity operations; assesses U.S. policy on cybersecurity in public surface transportation; and provides …


The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig Aug 2020

The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Brave New World - Emerging Threats In Cybersecurity, Rhonda S. Binda Aug 2020

Brave New World - Emerging Threats In Cybersecurity, Rhonda S. Binda

Open Educational Resources

The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities in particular are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, governments are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more …


Brave New World - Reslience, Rhonda S. Binda Aug 2020

Brave New World - Reslience, Rhonda S. Binda

Open Educational Resources

The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, city governments worldwide are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more …


Hacking Nation-State Relationships: Exploiting The Vulnerability Of The Liberal International Order, Ray Marie Tischio May 2020

Hacking Nation-State Relationships: Exploiting The Vulnerability Of The Liberal International Order, Ray Marie Tischio

Senior Theses

This thesis explores the implications of nation-state cyberwarfare and cyber conflict in the context of geopolitics and international studies. The emergence of nation-state cyber conflict has increased in frequency and severity in the last decade. In order to investigate what renders cyberwarfare a new and unique challenge to specific geopolitical climates and international systems at large, research on state-level cyber conflict within bilateral relationships—all of which cyber activity is significantly prevalent—is presented in the following three case studies: US-China, US-Iran, and US-Russia. Findings of these three case studies are used in subsequent analysis to articulate the specific ways in which …


Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo May 2020

Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo

Political Science & International Studies | Senior Theses

Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …


Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey Apr 2020

A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey

Honors Program Contracts

Adversaries launch cyberattacks or cyber-exploits with contrasting intentions and desired outcomes. A cyberattack is a malicious attempt by a state, third party, or individual to disrupt a computer’s network; whereas, a cyber-exploit is an action that uncovers and steals “confidential” information from a computer’s data. 1 Within this research paper, the main adversary of such cyberattacks and/or exploits will be the nation-state. The victims of these cyberattacks will range from multinational corporations, such as Sony, to nuclear programs in Iran. This essay will focus on four motivations behind such cyberattacks: (1) private sector hacking (the theft of intellectual property) (2) …


Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller Apr 2020

Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller

Psychology Theses & Dissertations

System administrators have started to adopt two-factor authentication (2FA) to increase user account resistance to cyber-attacks. Systems with 2FA require users to verify their identity using a password and a second-factor authentication device to gain account access. This research found that 60% of users only enroll one second-factor device to their account. If a user’s second factor becomes unavailable, systems are using different procedures to ensure its authorized owner recovers the account. Account recovery is essentially a bypass of the system’s main security protocols and needs to be handled as an alternative authentication process (Loveless, 2018). The current research aimed …


Cedarville's Cyber Operations Major Is First In Ohio, Mark D. Weinstein Mar 2020

Cedarville's Cyber Operations Major Is First In Ohio, Mark D. Weinstein

News Releases

Cedarville University received approval from the Ohio Department of Higher Education and the Higher Learning Commission to offer the first-of-its-kind cyber operations major in Ohio, effective in the fall 2020 semester. Cedarville’s Board of Trustees approved the new major at its January 24, 2020 meeting.


Examining Pilot Response To Cybersecurity Events On The Flight Deck, Meredith Carroll Ph.D., Summer Rebensky, Paige Sanchez Mar 2020

Examining Pilot Response To Cybersecurity Events On The Flight Deck, Meredith Carroll Ph.D., Summer Rebensky, Paige Sanchez

National Training Aircraft Symposium (NTAS)

Cybersecurity is a growing concern in the aviation industry. In general, cybersecurity research has typically focused on providing technical solutions such as hardening networks and improving computer systems, with little focus on the human operator. Human operators, such as pilots, are often the last line of defense; however, it is currently unclear whether pilots can recognize cybersecurity vulnerabilities, detect when a system is being compromised, and respond appropriately to a cybersecurity event. A review of literature revealed three key stages in cybersecurity response decision process (susceptibility, detection, and response) that are influenced by eight separate factors (perceived susceptibility, perceived safeguard …


A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson Feb 2020

A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson

International Journal of Cybersecurity Intelligence & Cybercrime

How individuals conceptualize their accountability related to digital technology. There may also be age-based vulnerabilities resulting from personal perceptions about the importance of engaging in best-practices. However, age may not be as critical as experience when it comes to implementation of these behaviors. Using the Cybersecurity Behaviors subscale of the Online Security Behaviors and Beliefs Questionnaire (OSBBQ), this study compared the self-reported cybersecurity attitudes and behaviors across college-aged individuals from Generation Y and Generation Z. Data were derived from a convenience sample of predominantly African-American and Caucasian respondents (N=593) recruited from two public universities in Virginia, USA. Four of the …


Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa Feb 2020

Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Review Of Fundamental To Know About The Future, Hannarae Lee Feb 2020

Review Of Fundamental To Know About The Future, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

What we consider fundamental elements can be easily overlooked or perceived as facts without the process of empirical testing. Especially in the field of cybercrime and cybersecurity, there are more speculations regarding the prevalence and the scope of harm carried out by wrongdoers than empirically tested studies. To fill the void, three articles included in the current issue addresses empirical findings of fundamental concerns and knowledge in the field of cybercrime and cybersecurity.


Cedarville University’S Cyber Operations Specialization Nationally Ranked, Mark D. Weinstein Feb 2020

Cedarville University’S Cyber Operations Specialization Nationally Ranked, Mark D. Weinstein

News Releases

Cedarville University’s computer science major with a cyber operations specialization has been ranked 18th in the nation according to the Bachelor’s Degree Center.


Increasing Connectivity Means Increasing Civilian Vulnerability In Developed And Developing Countries, Yara Amelia Contijoch Feb 2020

Increasing Connectivity Means Increasing Civilian Vulnerability In Developed And Developing Countries, Yara Amelia Contijoch

Senior Theses

No abstract provided.


Cybersecurity Major Added At Cedarville, Mark D. Weinstein Jan 2020

Cybersecurity Major Added At Cedarville, Mark D. Weinstein

News Releases

Cedarville University recently announced the formation of a cyber operations major, the first of its kind in Ohio. The Cedarville University Board of Trustees approved the new major during its meeting on January 24.


Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan Jan 2020

Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan

Information Science Faculty Publications

Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI's …


Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta Jan 2020

Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta

Journal of Cybersecurity Education, Research and Practice

Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This article discusses the need to incorporate courses discussing the Dark Web in criminal justice. A review of existing cyber-criminal justice programs in Texas and nationally suggests that most community colleges and 4-year universities have yet to develop courses/programs in understanding and investigating the Dark Web on the internet. The Dark Web serves as the …


Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle Jan 2020

Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle

Walden Dissertations and Doctoral Studies

Small business leaders face a wide range of cybersecurity threats. Ransomware is a specific cybersecurity threat that cybercriminals can use to deny small business leaders’ access to data in exchange for a ransom payment. Grounded in routine activity conceptual framework, the purpose of this qualitative multiple case study was to explore effective strategies small business leaders use to address ransomware. Data were collected from 5 leaders of small businesses in the southeast region of the United States. Data sources included interviews and archival documents. Data were analyzed using Yin’s 5 step process. The analysis revealed 3 primary themes: ransomware strategy, …


An Economic Analysis Of Cyber Warfare Governance Models, Kevin M. Kelleher Jan 2020

An Economic Analysis Of Cyber Warfare Governance Models, Kevin M. Kelleher

Electronic Theses and Dissertations

Allusions to death delivered by bits and bytes have been in vogue since the Reagan administration. Yet, as the internet and its connected devices have since proliferated, cyber violence remains far more fiction than fact. Nevertheless, prominent U.S. officials have all but assured the eventuality of a devastating attack. In anticipation, political, legal, and industry experts are now seeking to codify and inculcate international norms to govern acts of war prosecuted via cyberspace. Two of the most prominent governance models to emerge are the Tallinn Manual and Microsoft’s Digital Geneva Convention. The driving thesis of this research argues that within …


Cyber Security In Mental Health: An Assessment Of Current Practice And Behavioral Intent, Richard Hamilton Stotts Jan 2020

Cyber Security In Mental Health: An Assessment Of Current Practice And Behavioral Intent, Richard Hamilton Stotts

Dissertations

Mental health practitioners rely on digital systems to interact with and in some instances treat patients (Hydari, Telang, & Marella, 2015; Recupero, & Rainey, 2005). Yet, while widespread use of digital devices provides significant practical advantages, that same use exacerbates the possibility of a cyber breach (Guterman, 1999). This research describes mental health practitioners’ current cyber security practices and the factors influencing their behavioral intentions to implement cyber security within clinical mental health settings. Factors assessed included knowledge, self-efficacy, norms, threat awareness and penalties. Mental health practitioners (n = 210) from across the United States formed the sample population, received …


The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney Jan 2020

The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney

CCE Theses and Dissertations

Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …