Cyber Security Education Initiative

Research Output 2009 2018

  • 8 Article
  • 7 Conference contribution
  • 1 Review article
2018
11 Citations (Scopus)

A bidirectional perspective of trust and risk in determining factors that influence mobile app installation

Chin, A. G., Harris, M. A. & Brookshire, R., Apr 2018, In : International Journal of Information Management. 39, p. 49-59 11 p.

Research output: Contribution to journalArticle

Application programs
loyalty
privacy
2016
1 Citation (Scopus)

Consumer trust in Google's top developers' apps: An exploratory study

Harris, M. A. & Chin, A. G., Jan 1 2016, In : Information and Computer Security. 24, 5, p. 474-495 22 p.

Research output: Contribution to journalArticle

Application programs
Google
Exploratory study
Developer
Consumer trust

Evaluating student learning in an IT curriculum using Bloom's - Webb's Curriculum Taxonomy

Patten, K. P. & Harris, M. A., Sep 28 2016, SIGITE 2016 - Proceedings of the 17th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, p. 111-114 4 p. (SIGITE 2016 - Proceedings of the 17th Annual Conference on Information Technology Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Taxonomies
Curricula
Information technology
Students
Accreditation
38 Citations (Scopus)

Identifying factors influencing consumers' intent to install mobile applications

Harris, M. A., Brookshire, R. & Chin, A. G., Jun 1 2016, In : International Journal of Information Management. 36, 3, p. 441-450 10 p.

Research output: Contribution to journalArticle

disposition
Purchasing
psychotherapy
Application programs
reputation
4 Citations (Scopus)

On mobile device security practices and training efficacy: An empirical study

Goyal Chin, A., Etudo, U. & Harris, M. A., Jan 1 2016, In : Informatics in Education. 15, 2, p. 235-252 18 p.

Research output: Contribution to journalArticle

Mobile devices
Students
training program
Electronic mail
Application programs
2015
6 Citations (Scopus)

Mobile application installation influences: Have mobile device users become desensitized to excessive permission requests?

Harris, M. A., Brookshire, R., Patten, K. P. & Regan, E. A., Jan 1 2015, 2015 Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, (2015 Americas Conference on Information Systems, AMCIS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Mobile devices
Risk perception

Probabilitics data model based on privacy tipping points

Rallapalli, M. V., Jan 1 2015, Environmental Engineering and Computer Application - Proceedings of the International Conference on Environmental Engineering and Computer Application, ICEECA 2014. Chan, K. (ed.). CRC Press/Balkema, p. 373-376 4 p. (Environmental Engineering and Computer Application - Proceedings of the International Conference on Environmental Engineering and Computer Application, ICEECA 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures
Data privacy
Industry
11 Citations (Scopus)

Using bloom's and Webb's taxonomies to integrate emerging cybersecurity topics into a computing curriculum

Harris, M. A. & Patten, K. P., Jan 1 2015, In : Journal of Information Systems Education. 26, 3, p. 219-234 16 p.

Research output: Contribution to journalArticle

Taxonomies
taxonomy
Curricula
curriculum
Accreditation
2014
29 Citations (Scopus)

Mobile device security considerations for small- and medium-sized enterprise business mobility

Harris, M. A. & Patten, K. P., Feb 14 2014, In : Information Management and Computer Security. 22, 1, p. 97-114 18 p., 17104144.

Research output: Contribution to journalReview article

medium-sized enterprise
small and medium-sized enterprise
Mobile devices
Industry
Small and medium-sized enterprises
2013
12 Citations (Scopus)

The need for BYOD mobile device security awareness and training

Harris, M. A., Patten, K. & Regan, E., Dec 1 2013, 19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime. p. 3441-3451 11 p. (19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Computer operating systems
lack
PC
popularity
17 Citations (Scopus)

The need to address mobile device security in the higher education IT curriculum

Patten, K. P. & Harris, M. A., Jan 1 2013, In : Journal of Information Systems Education. 24, 1, p. 41-52 12 p.

Research output: Contribution to journalArticle

Mobile devices
Curricula
Education
curriculum
education
2012
11 Citations (Scopus)

Mobile and connected device security considerations: A dilemma for small and medium enterprise business mobility?

Harris, M. A., Patten, K., Regan, E. & Fjermestad, J., Dec 1 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. p. 1677-1683 7 p. (18th Americas Conference on Information Systems 2012, AMCIS 2012; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

business enterprise
Industry
expert
resources
Smartphones
10 Citations (Scopus)

Routes to security compliance: Be good or be shamed?

Harris, M. & Furnell, S., Dec 1 2012, In : Computer Fraud and Security. 2012, 12, p. 12-20 9 p.

Research output: Contribution to journalArticle

Security of data
Managers
Personnel
staff
responsibility
2011

A privacy agreement negotiation model in B2C e-commerce transactions

Rallapalli, M. V., Jan 1 2011, In : International Journal of Information Security and Privacy. 5, 4, p. 1-7 7 p.

Research output: Contribution to journalArticle

Web services

SOA in enterprise architectures: Overlooked misperceptions, pitfalls and tangible benefits

Rallapalli, M. V., Dec 1 2011, 21st Annual International Symposium of the International Council on Systems Engineering, INCOSE 2011. p. 1252-1263 12 p. (21st Annual International Symposium of the International Council on Systems Engineering, INCOSE 2011; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Service oriented architecture (SOA)
Industry
Enterprise software
Software architecture
Web services
2009

Managing and achieving process integrity in SOA

Rallapalli, M. V., Dec 1 2009, 2009 International Conference on Computer and Electrical Engineering, ICCEE 2009. p. 70-74 5 p. 5380665. (2009 International Conference on Computer and Electrical Engineering, ICCEE 2009; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Service oriented architecture (SOA)
Industry