Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
One of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to inadequate experimental design. This has prevented us from modeling a computational system to protect against...
The impact of COVID-19 pandemic to our society may be unprecedented. While an effective cure or vaccine is under development, maintaining social distance is an essential step in defending personal as well as public health. This study...
Words symbolically represent communicative and behavioral intent, and can provide clues to a communicator’s future actions in online communication. This paper describes a sociotechnical study conducted from 2008 through 2015 to identify...
Language as a symbolic medium plays an important role in virtual communications. In a primarily linguistic environment such as cyberspace, words are an expressed form of intent and actions. This paper intends to investigate the functions...
The ability to discover cyberbullying "hotspots" on social media is vitally important for purposes of preventing victimization. This study attempts to develop a prediction model for identifying cyberbullying "hotspots" by analyzing the...
Insider threat is a “wicked” contemporary organizational problem. It poses significant threats to organizational operations and information security. This paper reviews insider threat research and outlines key propositions to...
CV19 SelfDefense is an mHealth approach to providing mobile phone users with situational awareness during the coronavirus pandemic, with the goal of protecting and defending personal health. Several individual risk reduction measures...
Gender is a salient feature of identity that is rarely questioned in our physical encounters. We are usually not confused about a person’s gender—generally it’s male or female. However, as the adoption of computer-mediated communication...
Cloud computing has become a popular alternative information curation solution for organizations. As more corporate proprietary information is stored in the Cloud, concerns about Cloud information security have also increased. This study...
Computer-mediated deception threatens the security of online users’ private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain observable linguistic features can...
Social media users have the freedom to propagate information, but this freedom has come with a price as social media has also become a channel to disseminate false information. It is thus vitally important to detect fake news in social...
This study explores the challenges of digital forensics investigation in file access, transfer and operations, and identifies file operational and behavioral patterns based on timestamps—in both the standalone as well as interactions...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.