Refereed Publications (journals, conferences, workshops)
Dupuis, M., Searle, R. and Renaud, K.V. (2025), "Finding grace in responses to adverse cybersecurity incidents", Journal of Intellectual Capital, Vol. 26 No. 1, pp. 45-70. https://doi.org/10.1108/JIC-04-2024-0128
Dupuis, M., Honomichl, R., Zantua, M., & Ju, B. (2025). Cybersecurity high school innovations: a path for educators to teach cybersecurity courses in their schools. Journal of the Colloquium for Information Systems Security Education, 12(1), 7. https://doi.org/10.53735/cisse.v12i1.198
Dupuis, M., Sung, H., & Long, S. (2025). AI and Deepfakes: An Examination of Educational Interventions in Combating Deepfake-Based Disinformation. 2025 IEEE 16th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA.
Smith, S. & Dupuis, M. (2025). Phishing Experiments in the Wild: Lessons for Ubiquitous and Context-Aware Security. 2025 IEEE 16th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA.
Jennings, C., Pham, S., & Dupuis, M. (2025). Engagement, Usability, and Learning in Narrative-Driven Cybersecurity Awareness Games. 2025 IEEE 16th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA.
Bergh, C., & Dupuis, M. (2025). Cybersecurity is Stressful: The Impact of Stress on Identifying Phishing Attacks. 2025 Cyber Awareness and Research Symposium (CARS), Grand Forks, ND, USA, 2025.
Huang, K. & Dupuis, M. (2025). Cybersecurity Education Outreach to Immigrant Communities in the U.S.: A Case Study. 2025 Cyber Awareness and Research Symposium (CARS), Grand Forks, ND, USA, 2025.
Dupuis, M. & Long, S. (2025). X Marks the Spot: An Examination of X and Its Transformation from Twitter. In Proceedings of The 11th European Conference on Social Media. Academic Conferences and publishing limited.
Dupuis, M., Powell, B.*, Lanphere, M.*, Duarte, M.*, and Hao, B.* (2024). “An Exploration of Factors Influencing Oversharing on Facebook Groups.” Journal of The Colloquium for Information Systems Security Education, 11(1). Best Paper Award.
Dupuis, M. & Jones, E.* (2024). Cyber Victimization: Tools Used to Combat Cybercrime and Victim. In Proceedings of Ninth International Congress on Information and Communication Technology: ICICT 2024, London: Volume 1 (Vol. 1, p. 141). Springer Nature.
Dupuis, M. & Renaud, K. (2024). Risk Assessment & Mitigation for Core Security Capabilities. Presented at the IEEE eCrime Symposium, Boston, Massachusetts.
Huang, K.* and Dupuis, M. (2024). Targeted Cybersecurity Education and Training Programs for Two Asiatic Minority Groups in the U.S. 9th Workshop on Inclusive Privacy and Security (WIPS 2024) of the Twentieth Symposium on Usable Privacy and Security (SOUPS 2024).
Jin, S. * and Dupuis, M. (2024). Password Usage Behavior of Online Users. 2024 Cyber Awareness and Research Symposium (CARS), Grand Forks, ND, USA, 2024, pp. 1-6, doi: 10.1109/CARS61786.2024.10778857.
Tsai, J.* and Dupuis, M. (2024). Identification and Operationalization of Key Risks and Mitigations for the Cybersecurity Risk Management of Home Users. 2024 Cyber Awareness and Research Symposium (CARS), Grand Forks, ND, USA, 2024, pp. 1-9, doi: 10.1109/CARS61786.2024.10778868.
Alsulami, S.* and Dupuis, M. (2024). The Effectiveness of Education and Fear Appeal to Prevent Spear Phishing Attacks. 2024 Cyber Awareness and Research Symposium (CARS), Grand Forks, ND, USA, 2024, pp. 1-8, doi: 10.1109/CARS61786.2024.10778693.
Renaud, K., & Dupuis, M. (2023). Cybersecurity Insights Gleaned from World Religions. Computers & Security, 132, 103326. https://doi.org/10.1016/j.cose.2023.103326
Schiarelli, V.*, & Dupuis, M. (2023). Evaluating the Public Perception of a Blockchain-Based Election. The 24th Annual Conference on Information Technology Education, 157–163. https://doi.org/10.1145/3585059.3611439
Sell, M.*, & Dupuis, M. (2023). Designing an Industrial Cybersecurity Program for an Operational Technology Group. The 24th Annual Conference on Information Technology Education, 125–130. https://doi.org/10.1145/3585059.3611438
Renaud, K., Dupuis, M., & Searle, R. (2022, October 24). Cybersecurity Regrets: I’ve had a few .... Je Ne Regrette. New Security Paradigms Workshop (NSPW ’22). New Security Paradigms Workshop, New Hampshire, USA. https://doi.org/10.1145/3584318.3584319
Crouse, L., & Dupuis, M. (2022). A Dangerous Infodemic: An Examination of the Impact Social Media Misinformation has on COVID-19 Vaccination Status. Proceedings of the 23rd Annual Conference on Information Technology Education, 37–43. https://doi.org/10.1145/3537674.3554754
Dupuis, M., Bee, J., & Wright-Mockler, A. (2022). Virtual Cybersecurity Camps: Lessons Learned. Proceedings of the 23rd Annual Conference on Information Technology Education, 130–133. https://doi.org/10.1145/3537674.3555787
Dupuis, M., Renaud, K., & Searle, R. (2022). Crowdsourcing Quality Concerns: An Examination of Amazon’s Mechanical Turk. The 23rd Annual Conference on Information Technology Education, 127–129. https://doi.org/10.1145/3537674.3555783
Dupuis, M., Renaud, K., & Jennings, A. (2022). Fear might motivate secure password choices in the short term, but at what cost? Proceedings of the 55th Hawaii International Conference on System Sciences 2022, 4796–4805. https://hdl.handle.net/10125/79922
Renaud, K., Searle, R. & Dupuis, M. (2021). Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil? New Security Paradigms Workshop, 70–87. https://doi.org/10.1145/3498891.3498896
Dupuis, M., Chhor, K., & Ly, N. (2021). Misinformation and Disinformation in the Era of COVID-19: The Role of Primary Information Sources and the Development of Attitudes Toward Vaccination. Proceedings of the 22st Annual Conference on Information Technology Education, 105–110. https://doi.org/10.1145/3450329.3476866
Dupuis, M., Jennings, A., & Renaud, K. (2021). Scaring People is Not Enough: An Examination of Fear Appeals within the Context of Promoting Good Password Hygiene. Proceedings of the 22st Annual Conference on Information Technology Education, 35–40. https://doi.org/10.1145/3450329.3476862
Renaud, K., Flowerday, S. & Dupuis, M. (2021). Moving from employee compliance to employee success in the cyber security domain. Computer Fraud & Security, 2021(4), 16–19. https://doi.org/10.1016/S1361-3723(21)00043-9
Dupuis, M. & Renaud, K. (2020). Scoping the ethical principles of cybersecurity fear appeals. Ethics and Information Technology. https://doi.org/10.1007/s10676-020-09560-0
.
Fort Lauderdale, FL, USA.
Dupuis, M., & Khan, F. (2018). Effects of peer feedback on password strength. In 2018 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1–9). San Diego, CA: IEEE.
https://doi.org/10.1109/ECRIME.2018.8376210
Dupuis, M. (2016). “Wait, Do I Know You?”: A Look at Personality and Preventing One’s Personal Information from being Compromised. In Proceedings of the 5th Annual Conference on Research in Information
Technology (pp. 55–55). Boston, MA, USA: ACM Press.
https://doi.org/10.1145/2978178.2978190
Dupuis, M., & Khadeer, S. (2016). Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and
the Insider Threat. In Proceedings of the 5th Annual Conference on Research in
Information Technology (pp. 35–40). Boston, MA, USA: ACM Press.
https://doi.org/10.1145/2978178.2978185
Dupuis, M.
and Endicott-Popovsky, B. (2014). “Managing Information Security
Curriculum when Facing Course Scheduling Challenges: A Case Study.”
Presented at the Colloquium for Information Systems Security
Education (CISSE 2014), San Diego, CA. (round table paper)
Dupuis, M.
and Endicott-Popovsky, B. (2014). “The Art of Cyber Warfare: An
Exploration of Classic Military Strategies and the Threat Against
Home Users.” Presented at the International Conference on Cyber
Warfare and Security (ICCWS 2014), West Lafayette, IN.
(presentation)
Dupuis, M.,
Menking, A., & Mason, R. (2014). “Perceptions of Walls: An
Exploration of Trait Affect and Personality in a Cross Cultural
Study of Perception of Risks Related to the Edward Snowden Case.”
Presented at the iConference, Berlin, Germany. (full paper)
Dupuis, M.,
Endicott-Popovsky, B., & Crossler, R. (2013). “An Analysis of the
Use of Amazon’s Mechanical Turk for Survey Research in the Cloud.”
Presented at the International Conference on Cloud Security
Management, Seattle, Washington. (full paper)
Dupuis, M. J.,
Crossler, R. E., & Endicott-Popovsky, B. (2012). “The Information
Security Behavior of Home Users: Exploring a User’s Risk Tolerance
and Past Experiences in the Context of Backing Up Information.”
Presented at The Dewald Roode Information Security Workshop, Provo,
Utah. (full paper)
Dupuis, M.,
Endicott-Popovsky, B., Wang, H., Subramaniam, I., and Du, Y. (2011).
“Top-Down Mandates and the Need for Organizational Governance, Risk
Management, and Compliance in China: A Discussion.” China-USA
Business Review. 10:5. 319-335. (journal article)
Dupuis, M.,
Endicott-Popovsky, B., Wang, H., Subramaniam, I., & Du, Y. (2010).
“Top-Down Mandates and the Need for Organizational Governance, Risk
Management, and Compliance in China: A Discussion.” Presented at the
Asia Pacific Economic Association Conference, Hong Kong, China.
(full paper)
Endicott-Popovsky, B. and Moss, M. (eds.) with
Dupuis, M. (2015).
“Is Digital Different?” Facet Publishing: London (U.K.).Book Contributions