All Stories

  1. Machine Learning and Survey-based Predictors of InfoSec Non-Compliance
  2. Cast to Vote: A Socio-technical Network Analysis of an Election Smartphone Application
  3. Impact of Deterrence and Inertia on Information Security Policy Changes
  4. InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior