Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (16)
- Physical Sciences and Mathematics (16)
- Information Security (12)
- Legal Studies (8)
- Criminology and Criminal Justice (7)
-
- Forensic Science and Technology (7)
- Public Affairs, Public Policy and Public Administration (7)
- Communication (6)
- Criminology (6)
- Psychology (6)
- Sociology (6)
- Business (5)
- Library and Information Science (4)
- Organizational Communication (4)
- Political Science (4)
- Public Relations and Advertising (4)
- Law (3)
- Other Public Affairs, Public Policy and Public Administration (3)
- American Politics (2)
- Databases and Information Systems (2)
- Defense and Security Studies (2)
- Human Factors Psychology (2)
- International Relations (2)
- Policy Design, Analysis, and Evaluation (2)
- Public Policy (2)
- Science and Technology Policy (2)
- Science and Technology Studies (2)
- Technology and Innovation (2)
- Urban Studies and Planning (2)
- Institution
-
- Bridgewater State University (6)
- Cedarville University (4)
- City University of New York (CUNY) (3)
- Fordham University (2)
- Old Dominion University (2)
-
- Walden University (2)
- American University Washington College of Law (1)
- Brigham Young University (1)
- Dominican University of California (1)
- Embry-Riddle Aeronautical University (1)
- Kennesaw State University (1)
- Merrimack College (1)
- Nova Southeastern University (1)
- San Jose State University (1)
- St. Mary's University (1)
- University of Denver (1)
- University of Kentucky (1)
- University of South Florida (1)
- Publication
-
- International Journal of Cybersecurity Intelligence & Cybercrime (6)
- News Releases (4)
- Open Educational Resources (3)
- Psychology Theses & Dissertations (2)
- Senior Theses (2)
-
- Walden Dissertations and Doctoral Studies (2)
- CCE Theses and Dissertations (1)
- Dissertations (1)
- Electronic Theses and Dissertations (1)
- Faculty Publications (1)
- Honors Program Contracts (1)
- Information Science Faculty Publications (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Journal of Cybersecurity Education, Research and Practice (1)
- Mineta Transportation Institute (1)
- National Training Aircraft Symposium (NTAS) (1)
- Political Science & International Studies | Senior Theses (1)
- USF Tampa Graduate Theses and Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 31
Full-Text Articles in Social and Behavioral Sciences
Repetition Of Computer Security Warnings Results In Differential Repetition Suppression Effects As Revealed With Functional Mri, C. Brock Kirwan, Daniel K. Bjornn, Bonnie Brinton Anderson, Anthony Vance, David Eargle, Jeffrey L. Jenkins
Repetition Of Computer Security Warnings Results In Differential Repetition Suppression Effects As Revealed With Functional Mri, C. Brock Kirwan, Daniel K. Bjornn, Bonnie Brinton Anderson, Anthony Vance, David Eargle, Jeffrey L. Jenkins
Faculty Publications
Computer users are often the last line of defense in computer security. However, with repeated exposures to system messages and computer security warnings, neural and behavioral responses show evidence of habituation. Habituation has been demonstrated at a neural level as repetition suppression where responses are attenuated with subsequent repetitions. In the brain, repetition suppression to visual stimuli has been demonstrated in multiple cortical areas, including the occipital lobe and medial temporal lobe. Prior research into the repetition suppression effect has generally focused on a single repetition and has not examined the pattern of signal suppression with repeated exposures. We used …
The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker
The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker
Psychology Theses & Dissertations
The current study examined the effects of security system framing, time pressure, and brand familiarity on mobile application download behaviors, with an emphasis on risk taking. According to the Prospect Theory, people tend to engage in irrational decision making, and make qualitatively different decisions when information is framed in terms of gains and losses (i.e., the framing effect). Past research has used this framing effect to guide the design of a risk display for mobile applications (apps), with the purpose of communicating the potential risks and minimizing insecure app selections. Time pressure has been shown to influence the framing effect …
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
USF Tampa Graduate Theses and Dissertations
Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.
To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …
Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade
Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade
International Journal of Cybersecurity Intelligence & Cybercrime
Academic institutions house enormous amounts of critical information from social security numbers of students to proprietary research data. Thus, maintaining up to date cybersecurity practices to protect academic institutions’ information and facilities against cyber-perpetrators has become a top priority. The purpose of this study is to assess common cybersecurity measures through a situational crime prevention (SCP) theoretical framework. Using a national data set of academic institutions in the United States, this study investigates the link between common cybersecurity measures, crime prevention activities, and cybercrimes. By focusing on the conceptualization of cybersecurity measures as SCP techniques, this study also offers the …
Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong
Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong
International Journal of Cybersecurity Intelligence & Cybercrime
This paper discusses and proposes the inclusion of a cyber or security risk assessment section during the course of public health initiatives involving the use of information and communication computer technology. Over the last decade, many public health research efforts have included information technologies such as Mobile Health (mHealth), Electronic Health (eHealth), Telehealth, and Digital Health to assist with unmet global development health needs. This paper provides a background on the lack of documentation on cybersecurity risks or vulnerability assessments in global public health areas. This study suggests existing frameworks and policies be adopted for public health. We also propose …
Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee
Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through …
Students Conduct Cybersecurity Research For Lockheed Martin, Mark D. Weinstein
Students Conduct Cybersecurity Research For Lockheed Martin, Mark D. Weinstein
News Releases
Lockheed Martin awarded a grant to Cedarville University’s Center for the Advancement of Cybersecurity to conduct proprietary cybersecurity-related research during the 2020 calendar year.
Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas
Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas
Mineta Transportation Institute
The intent of this study is to assess the readiness, resourcing, and structure of public transit agencies to identify, protect from, detect, respond to, and recover from cybersecurity vulnerabilities and threats. Given the multitude of connected devices already in use by the transit industry and the vast amount of data generated (with more coming online soon), the transit industry is vulnerable to malicious cyber-attack and other cybersecurity-related threats. This study reviews the state of best cybersecurity practices in public surface transit; outlines U.S. public surface transit operators’ cybersecurity operations; assesses U.S. policy on cybersecurity in public surface transportation; and provides …
The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig
The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Brave New World - Emerging Threats In Cybersecurity, Rhonda S. Binda
Brave New World - Emerging Threats In Cybersecurity, Rhonda S. Binda
Open Educational Resources
The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities in particular are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, governments are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more …
Brave New World - Reslience, Rhonda S. Binda
Brave New World - Reslience, Rhonda S. Binda
Open Educational Resources
The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, city governments worldwide are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more …
Hacking Nation-State Relationships: Exploiting The Vulnerability Of The Liberal International Order, Ray Marie Tischio
Hacking Nation-State Relationships: Exploiting The Vulnerability Of The Liberal International Order, Ray Marie Tischio
Senior Theses
This thesis explores the implications of nation-state cyberwarfare and cyber conflict in the context of geopolitics and international studies. The emergence of nation-state cyber conflict has increased in frequency and severity in the last decade. In order to investigate what renders cyberwarfare a new and unique challenge to specific geopolitical climates and international systems at large, research on state-level cyber conflict within bilateral relationships—all of which cyber activity is significantly prevalent—is presented in the following three case studies: US-China, US-Iran, and US-Russia. Findings of these three case studies are used in subsequent analysis to articulate the specific ways in which …
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Political Science & International Studies | Senior Theses
Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey
A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey
Honors Program Contracts
Adversaries launch cyberattacks or cyber-exploits with contrasting intentions and desired outcomes. A cyberattack is a malicious attempt by a state, third party, or individual to disrupt a computer’s network; whereas, a cyber-exploit is an action that uncovers and steals “confidential” information from a computer’s data. 1 Within this research paper, the main adversary of such cyberattacks and/or exploits will be the nation-state. The victims of these cyberattacks will range from multinational corporations, such as Sony, to nuclear programs in Iran. This essay will focus on four motivations behind such cyberattacks: (1) private sector hacking (the theft of intellectual property) (2) …
Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller
Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller
Psychology Theses & Dissertations
System administrators have started to adopt two-factor authentication (2FA) to increase user account resistance to cyber-attacks. Systems with 2FA require users to verify their identity using a password and a second-factor authentication device to gain account access. This research found that 60% of users only enroll one second-factor device to their account. If a user’s second factor becomes unavailable, systems are using different procedures to ensure its authorized owner recovers the account. Account recovery is essentially a bypass of the system’s main security protocols and needs to be handled as an alternative authentication process (Loveless, 2018). The current research aimed …
Cedarville's Cyber Operations Major Is First In Ohio, Mark D. Weinstein
Cedarville's Cyber Operations Major Is First In Ohio, Mark D. Weinstein
News Releases
Cedarville University received approval from the Ohio Department of Higher Education and the Higher Learning Commission to offer the first-of-its-kind cyber operations major in Ohio, effective in the fall 2020 semester. Cedarville’s Board of Trustees approved the new major at its January 24, 2020 meeting.
Examining Pilot Response To Cybersecurity Events On The Flight Deck, Meredith Carroll Ph.D., Summer Rebensky, Paige Sanchez
Examining Pilot Response To Cybersecurity Events On The Flight Deck, Meredith Carroll Ph.D., Summer Rebensky, Paige Sanchez
National Training Aircraft Symposium (NTAS)
Cybersecurity is a growing concern in the aviation industry. In general, cybersecurity research has typically focused on providing technical solutions such as hardening networks and improving computer systems, with little focus on the human operator. Human operators, such as pilots, are often the last line of defense; however, it is currently unclear whether pilots can recognize cybersecurity vulnerabilities, detect when a system is being compromised, and respond appropriately to a cybersecurity event. A review of literature revealed three key stages in cybersecurity response decision process (susceptibility, detection, and response) that are influenced by eight separate factors (perceived susceptibility, perceived safeguard …
A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson
A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson
International Journal of Cybersecurity Intelligence & Cybercrime
How individuals conceptualize their accountability related to digital technology. There may also be age-based vulnerabilities resulting from personal perceptions about the importance of engaging in best-practices. However, age may not be as critical as experience when it comes to implementation of these behaviors. Using the Cybersecurity Behaviors subscale of the Online Security Behaviors and Beliefs Questionnaire (OSBBQ), this study compared the self-reported cybersecurity attitudes and behaviors across college-aged individuals from Generation Y and Generation Z. Data were derived from a convenience sample of predominantly African-American and Caucasian respondents (N=593) recruited from two public universities in Virginia, USA. Four of the …
Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa
Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Review Of Fundamental To Know About The Future, Hannarae Lee
Review Of Fundamental To Know About The Future, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
What we consider fundamental elements can be easily overlooked or perceived as facts without the process of empirical testing. Especially in the field of cybercrime and cybersecurity, there are more speculations regarding the prevalence and the scope of harm carried out by wrongdoers than empirically tested studies. To fill the void, three articles included in the current issue addresses empirical findings of fundamental concerns and knowledge in the field of cybercrime and cybersecurity.
Cedarville University’S Cyber Operations Specialization Nationally Ranked, Mark D. Weinstein
Cedarville University’S Cyber Operations Specialization Nationally Ranked, Mark D. Weinstein
News Releases
Cedarville University’s computer science major with a cyber operations specialization has been ranked 18th in the nation according to the Bachelor’s Degree Center.
Increasing Connectivity Means Increasing Civilian Vulnerability In Developed And Developing Countries, Yara Amelia Contijoch
Increasing Connectivity Means Increasing Civilian Vulnerability In Developed And Developing Countries, Yara Amelia Contijoch
Senior Theses
No abstract provided.
Cybersecurity Major Added At Cedarville, Mark D. Weinstein
Cybersecurity Major Added At Cedarville, Mark D. Weinstein
News Releases
Cedarville University recently announced the formation of a cyber operations major, the first of its kind in Ohio. The Cedarville University Board of Trustees approved the new major during its meeting on January 24.
Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan
Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan
Information Science Faculty Publications
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI's …
Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta
Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta
Journal of Cybersecurity Education, Research and Practice
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This article discusses the need to incorporate courses discussing the Dark Web in criminal justice. A review of existing cyber-criminal justice programs in Texas and nationally suggests that most community colleges and 4-year universities have yet to develop courses/programs in understanding and investigating the Dark Web on the internet. The Dark Web serves as the …
Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle
Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle
Walden Dissertations and Doctoral Studies
Small business leaders face a wide range of cybersecurity threats. Ransomware is a specific cybersecurity threat that cybercriminals can use to deny small business leaders’ access to data in exchange for a ransom payment. Grounded in routine activity conceptual framework, the purpose of this qualitative multiple case study was to explore effective strategies small business leaders use to address ransomware. Data were collected from 5 leaders of small businesses in the southeast region of the United States. Data sources included interviews and archival documents. Data were analyzed using Yin’s 5 step process. The analysis revealed 3 primary themes: ransomware strategy, …
An Economic Analysis Of Cyber Warfare Governance Models, Kevin M. Kelleher
An Economic Analysis Of Cyber Warfare Governance Models, Kevin M. Kelleher
Electronic Theses and Dissertations
Allusions to death delivered by bits and bytes have been in vogue since the Reagan administration. Yet, as the internet and its connected devices have since proliferated, cyber violence remains far more fiction than fact. Nevertheless, prominent U.S. officials have all but assured the eventuality of a devastating attack. In anticipation, political, legal, and industry experts are now seeking to codify and inculcate international norms to govern acts of war prosecuted via cyberspace. Two of the most prominent governance models to emerge are the Tallinn Manual and Microsoft’s Digital Geneva Convention. The driving thesis of this research argues that within …
Cyber Security In Mental Health: An Assessment Of Current Practice And Behavioral Intent, Richard Hamilton Stotts
Cyber Security In Mental Health: An Assessment Of Current Practice And Behavioral Intent, Richard Hamilton Stotts
Dissertations
Mental health practitioners rely on digital systems to interact with and in some instances treat patients (Hydari, Telang, & Marella, 2015; Recupero, & Rainey, 2005). Yet, while widespread use of digital devices provides significant practical advantages, that same use exacerbates the possibility of a cyber breach (Guterman, 1999). This research describes mental health practitioners’ current cyber security practices and the factors influencing their behavioral intentions to implement cyber security within clinical mental health settings. Factors assessed included knowledge, self-efficacy, norms, threat awareness and penalties. Mental health practitioners (n = 210) from across the United States formed the sample population, received …
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
CCE Theses and Dissertations
Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …