Profils utilisateurs correspondant à "Deanna House"

Deanna House

University of Nebraska Omaha
Adresse e-mail validée de unomaha.edu
Cité 172 fois

Phishing: message appraisal and the exploration of fear and self-confidence

D House, MK Raja - Behaviour & Information Technology, 2020 - Taylor & Francis
Phishing attacks have threatened the security of both home users and organisations in
recent years. Phishing uses social engineering to fraudulently obtain information that is …

The tail wagging the dog: An overdue examination of student teaching evaluations

P Miles, D House - International Journal of Higher …, 2015 - digitalcommons.unomaha.edu
Purpose: The purpose of this research is to examine the impact of several factors beyond the
professor’s control and their unique impact on Student Teaching Evaluations (STEs). The …

Politeness in security directives: insights in browser compliance for the human element

D House, G Giordano - Computers & Security, 2020 - Elsevier
The technical protection provided by information security technology is necessary as a
frontline defense against threats. However, the human element adds great risk to systems and …

Role of gender differences on individuals' responses to electronic word-of-mouth in social interactions

J Sun, S Song, D House, M Kwon - Applied Economics, 2019 - Taylor & Francis
Considering the significant effects of electronic Word-of-Mouth (eWOM), this research
explores how individuals respond to eWOM and whether gender differences exist in their …

Ensuring transparency in using chatgpt for public sentiment analysis

CH Tsai, G Nandy, D House, J Carroll - Proceedings of the 25th Annual …, 2024 - dl.acm.org
The advancement of generative AI, involving the utilization of large language models (LLMs)
like ChatGPT to assess public opinion and sentiment, has become increasingly prevalent. …

Navigating Challenging Terrain Surrounding DoD Response to Homeland Attacks on Critical Infrastructure: Case Studies of Prior Incidents Utilizing an Extended …

L Nolan, D Tennant, D House - Computers & Security, 2024 - Elsevier
The complexity of DoD response to cyberattacks on critical infrastructure entities is a relatively
understudied area, particularly when considering attacks that fall within the nebulous area …

Invoking suspicion for improved accuracy in phishing email identification

M Harris, D House - 2023 - aisel.aisnet.org
Threats to private and public sector environments are increasing in sophistication and
becoming increasingly difficult to identify proactively. While there is urgency to stay abreast of …

Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce

M Black, L Obradovic, D House - Journal of Cybersecurity, 2024 - academic.oup.com
Those charged with protecting the homeland through intelligence analysis, particularly in
counterterrorism, must be capable of rapidly adopting innovative technologies to detect and …

[PDF][PDF] Enabling Digital Transformation Strategies with Hackathons in Large-Scale Critical Infrastructures

C Lauth, D House, I Inuwa - ICIS 2019 Proceedings, 2020 - researchgate.net
In order to be successful and effective, digital transformation requires a significant effort
related to reinvention in an organization. In addition, there are many cultural changes and …

CYBER RED LINES

DL Tennant, L Nolan, D House - Æther: A Journal of Strategic Airpower & …, 2024 - JSTOR
While the concept of red lines is relatively well-documented and discussed in areas of
research surrounding deterrence and acts of war, the term cyber red lines is rather complicated …