default search action
Marc J. Dupuis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j4]Karen Renaud, Marc J. Dupuis:
Cybersecurity Insights Gleaned from World Religions. Comput. Secur. 132: 103326 (2023) - 2021
- [j3]Marc J. Dupuis, Karen Renaud:
Scoping the ethical principles of cybersecurity fear appeals. Ethics Inf. Technol. 23(3): 265-284 (2021) - 2019
- [j2]Karen Renaud, Marc J. Dupuis:
Should we scare people into behaving securely? Netw. Secur. 2019(11): 20 (2019) - 2017
- [j1]Marc J. Dupuis, Samreen Khadeer, Joyce Huang:
"I Got the Job!": An exploratory study examining the psychological factors related to status updates on facebook. Comput. Hum. Behav. 73: 132-140 (2017)
Conference and Workshop Papers
- 2022
- [c27]Marc J. Dupuis, Karen Renaud, Anna Jennings:
Fear might motivate secure password choices in the short term, but at what cost? HICSS 2022: 1-10 - [c26]Karen Renaud, Rosalind Searle, Marc J. Dupuis:
Cybersecurity Regrets: I've had a few.... Je Ne Regrette. NSPW 2022: 1-20 - [c25]Marc J. Dupuis, Karen Renaud, Rosalind Searle:
Crowdsourcing Quality Concerns: An Examination of Amazon's Mechanical Turk. SIGITE 2022: 127-129 - [c24]Marc J. Dupuis, Joshua Bee, Ann Wright-Mockler:
Virtual Cybersecurity Camps: Lessons Learned. SIGITE 2022: 130-133 - 2021
- [c23]Karen Renaud, Rosalind Searle, Marc J. Dupuis:
Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil? NSPW 2021: 70-87 - [c22]Marc J. Dupuis, Anna Jennings, Karen Renaud:
Scaring People is Not Enough: An Examination of Fear Appeals within the Context of Promoting Good Password Hygiene. SIGITE 2021: 35-40 - [c21]Marc J. Dupuis, Kelly Chhor, Nhu Ly:
Misinformation and Disinformation in the Era of COVID-19: The Role of Primary Information Sources and the Development of Attitudes Toward Vaccination. SIGITE 2021: 105-110 - 2020
- [c20]Marc J. Dupuis, Jaynie Shorb, James Walker, Fred B. Holt, Michael McIntosh:
Do You See What I See?: The Use of Visual Passwords for Authentication. SIGITE 2020: 58-61 - [c19]Marc J. Dupuis, Karen Renaud:
Conducting. SIGITE 2020: 320-323 - [c18]Marc J. Dupuis, Samantha E. Smith:
Clickthrough Testing for Real-World Phishing Simulations. SIGITE 2020: 347 - 2019
- [c17]Marc J. Dupuis, Robert E. Crossler:
The Compromise of One's Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals. HICSS 2019: 1-10 - [c16]Karen Renaud, Marc J. Dupuis:
Cyber security fear appeals: unexpectedly complicated. NSPW 2019: 42-56 - [c15]Marc J. Dupuis, Tamara Geiger, Marshelle Slayton, Frances Dewing:
The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help? SIGITE 2019: 81-86 - [c14]Jessica Nguyen, Marc J. Dupuis:
Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations. SIGITE 2019: 93-98 - [c13]Yun-Tai Chang, Marc J. Dupuis:
My Voiceprint Is My Authenticator: A Two-Layer Authentication Approach Using Voiceprint for Voice Assistants. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1318-1325 - [c12]Marc J. Dupuis, Andrew Williams:
The Spread of Disinformation on the Web: An Examination of Memes on Social Networking. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1412-1418 - [c11]Marc J. Dupuis, Camelia Bejan, Matt Bishop, Scott David, Brent Lagesse:
Design Patterns for Compensating Controls for Securing Financial Sessions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1437-1443 - [c10]Marc J. Dupuis:
Going Back for That One Last Thing in the House on Fire: How Fear, Attentiveness, Sadness, Joviality, and Other Lower Order Dimensions of Affect Influence Our Security and Privacy Behavior. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1825-1833 - [c9]Marc J. Dupuis, Seth Pham, Maximilian Weiß:
Facebook vs. Twitter: An Examination of Differences in Behavior Type and Substance Based on Psychological Factors. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1834-1840 - [c8]Marc J. Dupuis, Maximilian Weiß:
Veterans and Their Inherent Cybersecurity Preparedness: Myth or Reality? SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1841-1845 - 2018
- [c7]Marc J. Dupuis, Faisal Khan:
Effects of peer feedback on password strength. eCrime 2018: 1-9 - [c6]Marc J. Dupuis, Mercy Ebenezer:
Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices. SIGITE 2018: 117-122 - [c5]Marc J. Dupuis:
Co-Op Light: Developing a Cybersecurity Workforce through Academia-Industry Partnerships. SIGITE 2018: 156 - 2016
- [c4]Marc J. Dupuis, Robert E. Crossler, Barbara Endicott-Popovsky:
Measuring the Human Factor in Information Security and Privacy. HICSS 2016: 3676-3685 - [c3]Marc J. Dupuis, Samreen Khadeer:
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat. RIIT 2016: 35-40 - [c2]Marc J. Dupuis:
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised. RIIT 2016: 55 - 2013
- [c1]Soon K. Bang, Sam Chung, Young Choh, Marc J. Dupuis:
A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps. RIIT 2013: 61-62
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint