Marc Dupuis
Cited by
Cited by
A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps
SK Bang, S Chung, Y Choh, M Dupuis
Proceedings of the 2nd annual conference on Research in information …, 2013
“I Got the Job!”: An exploratory study examining the psychological factors related to status updates on facebook
M Dupuis, S Khadeer, J Huang
Computers in Human Behavior 73, 132-140, 2017
An analysis of the use of amazon’s mechanical turk for survey research in the cloud
M Dupuis, B Endicott-Popovsky, R Crossler
ICCSM2013-proceedings of the international conference on cloud security …, 2013
Cyber Security Fear Appeals: Unexpectedly Complicated
K Renaud, M Dupuis
New Security Paradigms Workshop (NSPW ’19), 15, 2019
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat
MJ Dupuis, S Khadeer
Research in Information Technology, 35-40, 2016
Measuring the Human Factor in Information Security and Privacy
M Dupuis, R Crossler, B Endicott-Popovsky
Hawaii International Conference on System Sciences (HICSS), 2016
Cyber Security for Everyone: An Introductory Course for Non-Technical Majors
MJ Dupuis
Journal of Cybersecurity Education, Research and Practice 2017 (1), Article 3, 2017
Is Digital Different?: How information creation, capture, preservation and discovery are being transformed
M Moss, B Endicott-Popovsky, M Dupuis
Facet Publishing, 2015
Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations
J Nguyen, M Dupuis
The 20th Annual ACM Conference on Information Technology Education (SIGITE’19), 2019
Effects of peer feedback on password strength
M Dupuis, F Khan
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-9, 2018
The Spread of Disinformation on the Web: An Examination of Memes on Social Networking
M Dupuis, A Williams
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019
The information security behavior of home users: Exploring a user’s risk tolerance and past experiences in the context of backing up information
M Dupuis, R Crossler, B Endicott-Popovsky
The Dewald Roode Information Security Workshop, Provo, Utah, 2012
The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals
M Dupuis, R Crossler
Proceedings of the 52nd Hawaii International Conference on System Sciences …, 2019
Scoping the ethical principles of cybersecurity fear appeals
M Dupuis, K Renaud
Ethics and Information Technology, 2020
The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?
M Dupuis, T Geiger, M Slayton, F Dewing
The 20th ACM Annual Conference on Information Technology Education (SIGITE ’19), 2019
Help wanted: Consumer privacy behavior and smart home internet of things (iot) devices
M Dupuis, M Ebenezer
Proceedings of the 19th Annual SIG Conference on Information Technology …, 2018
Shame in cyber security: effective behavior modification tool or counterproductive foil?
K Renaud, R Searle, M Dupuis
New Security Paradigms Workshop, 70-87, 2021
Misinformation and Disinformation in the Era of COVID-19: The Role of Primary Information Sources and the Development of Attitudes Toward Vaccination
M Dupuis, K Chhor, N Ly
Proceedings of the 22nd Annual Conference on Information Technology …, 2021
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised
MJ Dupuis
Research in Information Technology, 55-55, 2016
Clickthrough Testing for Real-World Phishing Simulations
MJ Dupuis, S Smith
The 21st Annual Conference on Information Technology Education (SIGITE ’20 …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20