Profils utilisateurs correspondant à "Deanna House"
Deanna HouseUniversity of Nebraska Omaha Adresse e-mail validée de unomaha.edu Cité 172 fois |
Phishing: message appraisal and the exploration of fear and self-confidence
Phishing attacks have threatened the security of both home users and organisations in
recent years. Phishing uses social engineering to fraudulently obtain information that is …
recent years. Phishing uses social engineering to fraudulently obtain information that is …
The tail wagging the dog: An overdue examination of student teaching evaluations
Purpose: The purpose of this research is to examine the impact of several factors beyond the
professor’s control and their unique impact on Student Teaching Evaluations (STEs). The …
professor’s control and their unique impact on Student Teaching Evaluations (STEs). The …
Politeness in security directives: insights in browser compliance for the human element
D House, G Giordano - Computers & Security, 2020 - Elsevier
The technical protection provided by information security technology is necessary as a
frontline defense against threats. However, the human element adds great risk to systems and …
frontline defense against threats. However, the human element adds great risk to systems and …
Role of gender differences on individuals' responses to electronic word-of-mouth in social interactions
Considering the significant effects of electronic Word-of-Mouth (eWOM), this research
explores how individuals respond to eWOM and whether gender differences exist in their …
explores how individuals respond to eWOM and whether gender differences exist in their …
Ensuring transparency in using chatgpt for public sentiment analysis
The advancement of generative AI, involving the utilization of large language models (LLMs)
like ChatGPT to assess public opinion and sentiment, has become increasingly prevalent. …
like ChatGPT to assess public opinion and sentiment, has become increasingly prevalent. …
Navigating Challenging Terrain Surrounding DoD Response to Homeland Attacks on Critical Infrastructure: Case Studies of Prior Incidents Utilizing an Extended …
L Nolan, D Tennant, D House - Computers & Security, 2024 - Elsevier
The complexity of DoD response to cyberattacks on critical infrastructure entities is a relatively
understudied area, particularly when considering attacks that fall within the nebulous area …
understudied area, particularly when considering attacks that fall within the nebulous area …
Invoking suspicion for improved accuracy in phishing email identification
Threats to private and public sector environments are increasing in sophistication and
becoming increasingly difficult to identify proactively. While there is urgency to stay abreast of …
becoming increasingly difficult to identify proactively. While there is urgency to stay abreast of …
Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce
Those charged with protecting the homeland through intelligence analysis, particularly in
counterterrorism, must be capable of rapidly adopting innovative technologies to detect and …
counterterrorism, must be capable of rapidly adopting innovative technologies to detect and …
[PDF][PDF] Enabling Digital Transformation Strategies with Hackathons in Large-Scale Critical Infrastructures
In order to be successful and effective, digital transformation requires a significant effort
related to reinvention in an organization. In addition, there are many cultural changes and …
related to reinvention in an organization. In addition, there are many cultural changes and …
CYBER RED LINES
DL Tennant, L Nolan, D House - Æther: A Journal of Strategic Airpower & …, 2024 - JSTOR
While the concept of red lines is relatively well-documented and discussed in areas of
research surrounding deterrence and acts of war, the term cyber red lines is rather complicated …
research surrounding deterrence and acts of war, the term cyber red lines is rather complicated …