Follow
Marc Dupuis
Title
Cited by
Cited by
Year
A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps
SK Bang, S Chung, Y Choh, M Dupuis
Proceedings of the 2nd annual conference on Research in information …, 2013
1032013
An analysis of the use of amazon’s mechanical turk for survey research in the cloud
M Dupuis, B Endicott-Popovsky, R Crossler
ICCSM2013-proceedings of the international conference on cloud security …, 2013
552013
“I Got the Job!”: An exploratory study examining the psychological factors related to status updates on facebook
M Dupuis, S Khadeer, J Huang
Computers in Human Behavior 73, 132-140, 2017
522017
Measuring the Human Factor in Information Security and Privacy
M Dupuis, R Crossler, B Endicott-Popovsky
Hawaii International Conference on System Sciences (HICSS), 2016
302016
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat
MJ Dupuis, S Khadeer
Research in Information Technology, 35-40, 2016
242016
Cyber Security Fear Appeals: Unexpectedly Complicated
K Renaud, M Dupuis
New Security Paradigms Workshop (NSPW ’19), 15, 2019
232019
Is Digital Different?: How information creation, capture, preservation and discovery are being transformed
M Moss, B Endicott-Popovsky, M Dupuis
Facet Publishing, 2015
222015
Cyber Security for Everyone: An Introductory Course for Non-Technical Majors
MJ Dupuis
Journal of Cybersecurity Education, Research and Practice 2017 (1), Article 3, 2017
202017
The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals
M Dupuis, R Crossler
Proceedings of the 52nd Hawaii International Conference on System Sciences …, 2019
142019
The information security behavior of home users: Exploring a user’s risk tolerance and past experiences in the context of backing up information
M Dupuis, R Crossler, B Endicott-Popovsky
The Dewald Roode Information Security Workshop, 33, 2012
142012
The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?
M Dupuis, T Geiger, M Slayton, F Dewing
The 20th ACM Annual Conference on Information Technology Education (SIGITE ’19), 2019
132019
Effects of peer feedback on password strength
M Dupuis, F Khan
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-9, 2018
122018
Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations
J Nguyen, M Dupuis
The 20th Annual ACM Conference on Information Technology Education (SIGITE’19), 2019
102019
The Spread of Disinformation on the Web: An Examination of Memes on Social Networking
M Dupuis, A Williams
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019
102019
Scoping the ethical principles of cybersecurity fear appeals
M Dupuis, K Renaud
Ethics and Information Technology, 2020
82020
Help wanted: Consumer privacy behavior and smart home internet of things (iot) devices
M Dupuis, M Ebenezer
Proceedings of the 19th Annual SIG Conference on Information Technology …, 2018
82018
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised
MJ Dupuis
Research in Information Technology, 55-55, 2016
82016
Shame in cyber security: effective behavior modification tool or counterproductive foil?
K Renaud, R Searle, M Dupuis
New Security Paradigms Workshop, 70-87, 2021
52021
Re-engineering the Cybersecurity Human Capital Crisis
M Zantua, M Dupuis, B Endicott-Popovsky
Special Edition of The Colloquium for Information Systems Security Education …, 2015
52015
Clickthrough Testing for Real-World Phishing Simulations
MJ Dupuis, S Smith
The 21st Annual Conference on Information Technology Education (SIGITE ’20 …, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20