office (425) 352-5016

Refereed Publications (journals, conferences, workshops)

Dupuis, M. & Crossler, R. (2019). The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals. In the Proceedings of the 52nd Hawaii International Conference on System Sciences . Maui, HI, USA.

Dupuis, M. (2018). Co-Op Light: Developing a Cybersecurity Workforce through Academia-Industry Partnerships. In Proceedings of ACM SIGITE conference (SIGITE ’18). Fort Lauderdale, FL, USA.

Dupuis, M., & Ebenezer, M. (2018). Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices. In Proceedings of ACM SIGITE conference (SIGITE ’18). Fort Lauderdale, FL, USA.

Dupuis, M., & Gordon, C. (2018). Evaluating Prevalence, Perceptions, and Effectiveness of Cyber Security and Privacy Education, Training, and Awareness Programs. In The Colloquium for Information Systems Security Education. New Orleans, Louisiana, USA.

Dupuis, M., & Khan, F. (2018). Effects of peer feedback on password strength. In 2018 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1–9). San Diego, CA: IEEE. https://doi.org/10.1109/ECRIME.2018.8376210

Dupuis, M. (2017). Cyber Security for Everyone: An Introductory Course for Non-Technical Majors. Journal of Cybersecurity Education, Research, and Practice, 2017(1, Article 3).

Dupuis, M., Khadeer, S., & Huang, J. (2017). “I Got the Job!”: An Exploratory Study Examining the Psychological Factors Related to Status Updates on Facebook. Computers in Human Behavior, 73, 132–140.

Khadeer, M., Dupuis, M., & Khadeer, S. (2018). Educating Consumers on the Security and Privacy of Internet of Things (IoT) Devices: A Quantifiable Security Compliance Measurement System to Aid in Purchasing Decisions. Journal of The Colloquium for Information System Security Education. 5:2.

Dupuis, M. (2016). “Wait, Do I Know You?”: A Look at Personality and Preventing One’s Personal Information from being Compromised. In Proceedings of the 5th Annual Conference on Research in Information Technology (pp. 55–55). Boston, MA, USA: ACM Press. https://doi.org/10.1145/2978178.2978190

Dupuis, M., & Khadeer, S. (2016). Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat. In Proceedings of the 5th Annual Conference on Research in Information Technology (pp. 35–40). Boston, MA, USA: ACM Press. https://doi.org/10.1145/2978178.2978185

Dupuis, M., Crossler, R., & Endicott-Popovsky, B. (2016). “Measuring the Human Factor in Information Security and Privacy.” To be presented at the Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii. (full paper)

Thompson, T., Dupuis, M., Goda, B., Bai, Y., Costarella, C., & Zantua, M. (2015). Systems Thinking Pedagogical Design: Developing a Veteran-Centric Masters Degree in Cybersecurity and Leadership. Special Edition of The Colloquium for Information Systems Security Education: Educational Approaches To Transition Former Military Personnel into the Cyber Security Field.

Zantua, M., Dupuis, M., and Endicott-Popovsky, B. (2015). “Re-engineering the Cybersecurity Human Capital Crisis.” Special Edition of The Colloquium for Information Systems Security Education: Educational Approaches to Transition Former Military Personnel into the Cybersecurity Field. 2:2. 156-162. (journal article)

Dupuis, M. and Endicott-Popovsky, B. (2014). “Managing Information Security Curriculum when Facing Course Scheduling Challenges: A Case Study.” Presented at the Colloquium for Information Systems Security Education (CISSE 2014), San Diego, CA. (round table paper)

 

Dupuis, M. and Endicott-Popovsky, B. (2014). “The Art of Cyber Warfare: An Exploration of Classic Military Strategies and the Threat Against Home Users.” Presented at the International Conference on Cyber Warfare and Security (ICCWS 2014), West Lafayette, IN. (presentation)

 

Dupuis, M., Menking, A., & Mason, R. (2014). “Perceptions of Walls: An Exploration of Trait Affect and Personality in a Cross Cultural Study of Perception of Risks Related to the Edward Snowden Case.” Presented at the iConference, Berlin, Germany. (full paper)

 

Mason, R., & Dupuis, M. (2014). “Cultural Values, Information Sources, and Perceptions of Security.” Presented at the iConference, Berlin, Germany. (research note)

 

Dupuis, M., Endicott-Popovsky, B., & Crossler, R. (2013). “An Analysis of the Use of Amazon’s Mechanical Turk for Survey Research in the Cloud.” Presented at the International Conference on Cloud Security Management, Seattle, Washington. (full paper)

 

Bang, S., Chung, S., Choh, Y., & Dupuis, M. (2013). “A Grounded Theory Analysis of Modern Web Applications - Knowledge, Skills, and Abilities for DevOps.” Presented at the Conference on Research in Information Technology, Orlando, Florida. (poster)

 

Dupuis, M. J., Crossler, R. E., & Endicott-Popovsky, B. (2012). “The Information Security Behavior of Home Users: Exploring a User’s Risk Tolerance and Past Experiences in the Context of Backing Up Information.” Presented at The Dewald Roode Information Security Workshop, Provo, Utah. (full paper)

 

Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I., and Du, Y. (2011). “Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion.” China-USA Business Review. 10:5. 319-335. (journal article)

 

Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I., & Du, Y. (2010). “Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion.” Presented at the Asia Pacific Economic Association Conference, Hong Kong, China. (full paper)

 

Book Contributions

Endicott-Popovsky, B. and Moss, M. (eds.) with Dupuis, M. (2015). “Is Digital Different?” Facet Publishing: London (U.K.).