office (425) 352-5016

Refereed Publications (journals, conferences, workshops)

Renaud, K., Dupuis, M., & Searle, R. (2022, October 24). Cybersecurity Regrets: I’ve had a few .... Je Ne Regrette. New Security Paradigms Workshop (NSPW ’22). New Security Paradigms Workshop, New Hampshire, USA. https://doi.org/10.1145/3584318.3584319

Crouse, L., & Dupuis, M. (2022). A Dangerous Infodemic: An Examination of the Impact Social Media Misinformation has on COVID-19 Vaccination Status. Proceedings of the 23rd Annual Conference on Information Technology Education, 37–43. https://doi.org/10.1145/3537674.3554754

Dupuis, M., Bee, J., & Wright-Mockler, A. (2022). Virtual Cybersecurity Camps: Lessons Learned. Proceedings of the 23rd Annual Conference on Information Technology Education, 130–133. https://doi.org/10.1145/3537674.3555787

Dupuis, M., Renaud, K., & Searle, R. (2022). Crowdsourcing Quality Concerns: An Examination of Amazon’s Mechanical Turk. The 23rd Annual Conference on Information Technology Education, 127–129. https://doi.org/10.1145/3537674.3555783

Dupuis, M., Renaud, K., & Jennings, A. (2022). Fear might motivate secure password choices in the short term, but at what cost? Proceedings of the 55th Hawaii International Conference on System Sciences 2022, 4796–4805. https://hdl.handle.net/10125/79922

Renaud, K., Searle, R. & Dupuis, M. (2021). Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil? New Security Paradigms Workshop, 70–87. https://doi.org/10.1145/3498891.3498896

Dupuis, M., Chhor, K., & Ly, N. (2021). Misinformation and Disinformation in the Era of COVID-19: The Role of Primary Information Sources and the Development of Attitudes Toward Vaccination. Proceedings of the 22st Annual Conference on Information Technology Education, 105–110. https://doi.org/10.1145/3450329.3476866

Dupuis, M., Jennings, A., & Renaud, K. (2021). Scaring People is Not Enough: An Examination of Fear Appeals within the Context of Promoting Good Password Hygiene. Proceedings of the 22st Annual Conference on Information Technology Education, 35–40. https://doi.org/10.1145/3450329.3476862

Renaud, K., Flowerday, S. & Dupuis, M. (2021). Moving from employee compliance to employee success in the cyber security domain. Computer Fraud & Security, 2021(4), 16–19. https://doi.org/10.1016/S1361-3723(21)00043-9

Dupuis, M. & Renaud, K. (2020). Scoping the ethical principles of cybersecurity fear appeals. Ethics and Information Technology. https://doi.org/10.1007/s10676-020-09560-0

Dupuis, M. and Renaud, K. (2020). Conducting “In-Person” Research During a Pandemic. In The 21st Annual Conference on Information Technology Education (SIGITE ’20), October 7–9, 2020, Virtual Event, USA. ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3368308.3415420

Dupuis, M., Shorb, J.*, Walker, J.*, Holt, F.B., and McIntosh, M. (2020). Do You See What I See? The Use of Visual Passwords for Authentication. In The 21st Annual Conference on Information Technology Education (SIGITE ’20), October 7–9, 2020, Virtual Event, USA. ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3368308.3415458

Dupuis, M. and Smith, S.* (2020). Clickthrough Testing for Real-World Phishing Simulations. In The 21st Annual Conference on Information Technology Education (SIGITE ’20), October 7–9, 2020, Virtual Event, USA. ACM, New York, NY, USA, 1 page. https://doi.org/10.1145/3368308.3415443

Williams, A. and Dupuis, M. 2020. I Don't Always Spread Disinformation on the Web, but When I do I Like to Use Memes: An Examination of Memes in the Spread of Disinformation. In Proceedings of The 11th International Multi-Conference on Complexity, Informatics and Cybernetics (IMCIC 2020), March 10-13, 2020, Orlando, Florida, USA. 165-172.

Renaud, K. and Dupuis, M. 2019. Cyber Security Fear Appeals: Unexpectedly Complicated. In New Security Paradigms Workshop (NSPW ’19), September 23–26, 2019, San Carlos, Costa Rica. ACM, New York, NY, USA, 15 pages. https://doi.org/10.1145/3368860.3368864

Dupuis, M., Geiger, T., Slayton, M., & Dewing, F. (2019). The Use and Non-Use of Cybersecurity Tools Among Consumers: Do TheyWant Help? Proceedings of The 20th Annual Conference on Information Technology Education (SIGITE ’19). Presented at the The 20th Annual Conference on Information Technology Education (SIGITE ’19), Tacoma, WA, USA. https://doi.org/10.1145/3349266.3351419

Nguyen, J., & Dupuis, M. (2019). Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations. Proceedings of The 20th Annual Conference on Information Technology Education (SIGITE ’19). Presented at the The 20th Annual Conference on Information Technology Education (SIGITE ’19), Tacoma, WA, USA. https://doi.org/10.1145/3349266.3351420

Chang, Y.-T., & Dupuis, M. (2019). My Voiceprint Is My Authenticator: A Two-layer Authentication Approach Using Voiceprint for Voice Assistants. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, 1318–1325. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00243

Dupuis, M. (2019). Going Back for that One Last Thing in the House on Fire: How Fear, Attentiveness, Sadness, Joviality, and Other Lower Order Dimensions of Affect Influence Our Security and Privacy Behavior. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, 1825–1833. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00322

Dupuis, M., Bejan, C., Bishop, M., David, S., & Lagesse, B. (2019). Design Patterns for Compensating Controls for Securing Financial Sessions. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, 1437–1443. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00260

Dupuis, M., Pham, S., & Weiss, M. (2019). Facebook vs. Twitter: An Examination of Differences in Behavior Type and Substance Based on Psychological Factors. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, 1834–1840. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00323

Dupuis, M., & Weiss, M. (2019). Veterans and their Inherent Cybersecurity Preparedness: Myth or Reality? 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, 1841–1845. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00324

Dupuis, M., & Williams, A. (2019). The Spread of Disinformation on the Web: An Examination of Memes on Social Networking. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, 1412–1418. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00256

Dupuis, M., Slayton, M., Geiger, T., & Dewing, F. (2019). "Cybersecurity Behavior: Current Trends in the Use of Protective Measures and Reasons Why They Aren’t Used." The Colloquium for Information Systems Security Education. Las Vegas, NV, USA.

Dupuis, M. & Crossler, R. (2019). "The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals." In the Proceedings of the 52nd Hawaii International Conference on System Sciences. Maui, HI, USA.

Dupuis, M. (2018). Co-Op Light: Developing a Cybersecurity Workforce through Academia-Industry Partnerships. In Proceedings of ACM SIGITE conference (SIGITE ’18). Fort Lauderdale, FL, USA.

Dupuis, M., & Ebenezer, M. (2018). Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices. In Proceedings of ACM SIGITE conference (SIGITE ’18). Fort Lauderdale, FL, USA.

Dupuis, M., & Gordon, C. (2018). Evaluating Prevalence, Perceptions, and Effectiveness of Cyber Security and Privacy Education, Training, and Awareness Programs. In The Colloquium for Information Systems Security Education. New Orleans, Louisiana, USA.

Dupuis, M., & Khan, F. (2018). Effects of peer feedback on password strength. In 2018 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1–9). San Diego, CA: IEEE. https://doi.org/10.1109/ECRIME.2018.8376210

Khadeer, M., Dupuis, M., & Khadeer, S. (2018). Educating Consumers on the Security and Privacy of Internet of Things (IoT) Devices: A Quantifiable Security Compliance Measurement System to Aid in Purchasing Decisions. Journal of The Colloquium for Information System Security Education. 5:2.

Dupuis, M. (2017). Cyber Security for Everyone: An Introductory Course for Non-Technical Majors. Journal of Cybersecurity Education, Research, and Practice, 2017 (1, Article 3).

Dupuis, M., Khadeer, S., & Huang, J. (2017). “I Got the Job!”: An Exploratory Study Examining the Psychological Factors Related to Status Updates on Facebook. Computers in Human Behavior. 73, 132–140.

Dupuis, M. (2016). “Wait, Do I Know You?”: A Look at Personality and Preventing One’s Personal Information from being Compromised. In Proceedings of the 5th Annual Conference on Research in Information Technology (pp. 55–55). Boston, MA, USA: ACM Press. https://doi.org/10.1145/2978178.2978190

Dupuis, M., & Khadeer, S. (2016). Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat. In Proceedings of the 5th Annual Conference on Research in Information Technology (pp. 35–40). Boston, MA, USA: ACM Press. https://doi.org/10.1145/2978178.2978185

Dupuis, M., Crossler, R., & Endicott-Popovsky, B. (2016). “Measuring the Human Factor in Information Security and Privacy.” To be presented at the Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii. (full paper)

Thompson, T., Dupuis, M., Goda, B., Bai, Y., Costarella, C., & Zantua, M. (2015). Systems Thinking Pedagogical Design: Developing a Veteran-Centric Masters Degree in Cybersecurity and Leadership. Special Edition of The Colloquium for Information Systems Security Education: Educational Approaches To Transition Former Military Personnel into the Cyber Security Field.

Zantua, M., Dupuis, M., and Endicott-Popovsky, B. (2015). “Re-engineering the Cybersecurity Human Capital Crisis.” Special Edition of The Colloquium for Information Systems Security Education: Educational Approaches to Transition Former Military Personnel into the Cybersecurity Field. 2:2. 156-162. (journal article)

Dupuis, M. and Endicott-Popovsky, B. (2014). “Managing Information Security Curriculum when Facing Course Scheduling Challenges: A Case Study.” Presented at the Colloquium for Information Systems Security Education (CISSE 2014), San Diego, CA. (round table paper)

 

Dupuis, M. and Endicott-Popovsky, B. (2014). “The Art of Cyber Warfare: An Exploration of Classic Military Strategies and the Threat Against Home Users.” Presented at the International Conference on Cyber Warfare and Security (ICCWS 2014), West Lafayette, IN. (presentation)

 

Dupuis, M., Menking, A., & Mason, R. (2014). “Perceptions of Walls: An Exploration of Trait Affect and Personality in a Cross Cultural Study of Perception of Risks Related to the Edward Snowden Case.” Presented at the iConference, Berlin, Germany. (full paper)

 

Mason, R., & Dupuis, M. (2014). “Cultural Values, Information Sources, and Perceptions of Security.” Presented at the iConference, Berlin, Germany. (research note)

 

Dupuis, M., Endicott-Popovsky, B., & Crossler, R. (2013). “An Analysis of the Use of Amazon’s Mechanical Turk for Survey Research in the Cloud.” Presented at the International Conference on Cloud Security Management, Seattle, Washington. (full paper)

 

Bang, S., Chung, S., Choh, Y., & Dupuis, M. (2013). “A Grounded Theory Analysis of Modern Web Applications - Knowledge, Skills, and Abilities for DevOps.” Presented at the Conference on Research in Information Technology, Orlando, Florida. (poster)

 

Dupuis, M. J., Crossler, R. E., & Endicott-Popovsky, B. (2012). “The Information Security Behavior of Home Users: Exploring a User’s Risk Tolerance and Past Experiences in the Context of Backing Up Information.” Presented at The Dewald Roode Information Security Workshop, Provo, Utah. (full paper)

 

Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I., and Du, Y. (2011). “Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion.” China-USA Business Review. 10:5. 319-335. (journal article)

 

Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I., & Du, Y. (2010). “Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion.” Presented at the Asia Pacific Economic Association Conference, Hong Kong, China. (full paper)

 

Book Contributions

Endicott-Popovsky, B. and Moss, M. (eds.) with Dupuis, M. (2015). “Is Digital Different?” Facet Publishing: London (U.K.).