* Graduate Student Contributor; ** Undergraduate Student Contributor
Refereed Journal Articles
- Dupuis, M. and Renaud, K. (2020). Scoping the Ethical Principles of Cybersecurity Fear Appeals. Ethics and Information Technology. (accepted: in production)
- Dupuis, M. and Williams, A.* (2020). Information Warfare: Memes and their Attack on our Most Valued Critical Infrastructure—the Democratic Institution Itself. Journal of Systemics, Cybernetics and Informatics: JSCI, 18(2), 44-54.
- Khadeer, M.*, Dupuis, M., & Khadeer, S.** (2018). Educating Consumers on the Security and Privacy of Internet of Things (IoT) Devices: A Quantifiable Security Compliance Measurement System to Aid in Purchasing Decisions. Journal of the Colloquium for Information Systems Security Education, 5(2), 60-81.
- Dupuis, M., Khadeer, S.**, & Huang, J.** (2017). “I Got the Job!”: An exploratory study examining the psychological factors related to status updates on facebook. Computers in Human Behavior, 73, 132-140.
- Dupuis, M. (2017). Cyber Security for Everyone: An Introductory Course for Non-Technical Majors. Journal of Cybersecurity Education, Research, and Practice, 2017 (1, Article 3).
- Thompson, T., Dupuis, M., Goda, B., Bai, Y., Costarella, C., & Zantua, M. (2015). Systems Thinking Pedagogical Design: Developing a Veteran-Centric Master’s Degree in Cybersecurity and Leadership. Special Edition of The Colloquium for Information Systems Security Education: Educational Approaches to Transition Former Military Personnel into the Cyber Security Field, 2(2), 163-183.
- Zantua, M., & Dupuis, M. (2015). Re-engineering the Cybersecurity Human Capital Crisis. Special Edition of The Colloquium for Information Systems Security Education: Educational Approaches to Transition Former Military Personnel into the Cyber Security Field, 2(2), 156-162
- Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I., & Du, Y.* (2011). Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion. China-USA Business Review, 319-336.
Refereed Conference Papers
- Dupuis, M. and Renaud, K. (2020). Conducting “In-Person” Research During a Pandemic. In The 21st Annual Conference on Information Technology Education (SIGITE ’20), October 7–9, 2020, Virtual Event, USA. ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3368308.3415420
- Dupuis, M., Shorb, J.*, Walker, J.*, Holt, F.B., and McIntosh, M. (2020). Do You See What I See? The Use of Visual Passwords for Authentication. In The 21st Annual Conference on Information Technology Education (SIGITE ’20), October 7–9, 2020, Virtual Event, USA. ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3368308.3415458
- Williams, A.* & Dupuis, M. (2020). I Don’t Always Spread Disinformation on the Web, but When I do I Like to Use Memes: An Examination of Memes in the Spread of Disinformation. 24th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2020, Orlando, Florida, March 10-13, 2020, (pp. 165-172). Best Paper Award Winner
- Renaud, K. & Dupuis, M. (2019). Cyber Security Fear Appeals: Unexpectedly Complicated. In Proceedings of 2019 New Security Paradigms Workshop, San Carlos, Costa Rica, September 23–26, 2019 (NSPW ’19), (pp. 42-56). https://doi.org/10.1145/3368860.3368864
- Dupuis, M., Geiger, T.*, Slayton, M.*, & Dewing, F. (2019, September). The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?. In Proceedings of the 20th Annual SIG Conference on Information Technology Education (pp. 81-86). ACM. https://doi.org/10.1145/3349266.3351419
- Nguyen, J.* & Dupuis, M. (2019, September). Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations. In Proceedings of the 20th Annual SIG Conference on Information Technology Education (pp. 93-98). ACM. https://doi.org/10.1145/3349266.3351420
- Chang, Y.-T.*, & Dupuis, M. (2019). My Voiceprint Is My Authenticator: A Two-layer Authentication Approach Using Voiceprint for Voice Assistants. 2019 IEEE International Conference on Advanced & Trusted Computing, (pp. 1318–1325). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00243
- Dupuis, M. (2019). Going Back for that One Last Thing in the House on Fire: How Fear, Attentiveness, Sadness, Joviality, and Other Lower Order Dimensions of Affect Influence Our Security and Privacy Behavior. 2019 IEEE International Conference on Internet of People, (pp. 1825–1833). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00322
- Dupuis, M., Bejan, C., Bishop, M., David, S., & Lagesse, B. (2019). Design Patterns for Compensating Controls for Securing Financial Sessions. 2019 IEEE International Workshop on Security Measurements of Cyber Networks (SMCN), (pp. 1437–1443). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00260
- Dupuis, M., Pham, S.*, & Weiss, M.* (2019). Facebook vs. Twitter: An Examination of Differences in Behavior Type and Substance Based on Psychological Factors. 2019 IEEE International Conference on Internet of People, (pp. 1834–1840). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00323
- Dupuis, M., & Williams, A.* (2019). The Spread of Disinformation on the Web: An Examination of Memes on Social Networking. 2019 IEEE International Conference on Advanced & Trusted Computing, (pp. 1412–1418). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00256
- Dupuis, M., & Weiss, M.* (2019). Veterans and their Inherent Cybersecurity Preparedness: Myth or Reality? 2019 IEEE International Conference on Internet of People, (pp. 1841–1845). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00324
- Dupuis, M., Slayton, M.*, Geiger, T.*, & Dewing, F. (2019). Cybersecurity Behavior: Current Trends in the Use of Protective Measures and Reasons Why They Aren’t Used. Presented at the The Colloquium for Information Systems Security Education, Las Vegas, Nevada.
- Dupuis, M., Crossler, R. (2019). The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals. In The 52nd Hawaii International Conference on System Sciences (HICSS). Maui, Hawaii: IEEE, (pp. 4841-4850). http://doi.org/10.24251/HICSS.2019.584
- Dupuis, M., & Ebenezer, M.* (2018). Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices. In Proceedings of ACM SIGITE conference (SIGITE ’18). Fort Lauderdale, FL, USA, (pp. 117-122). https://doi.org/10.1145/3241815.3241869
- Dupuis, M. & Gordon, C.* (2018). Evaluating Prevalence, Perceptions, and Effectiveness of Cyber Security and Privacy Education, Training, and Awareness Programs. Presented at the The Colloquium for Information Systems Security Education, New Orleans, Louisiana.
- Dupuis, M. & Khan, F.* (2018). Effects of Peer Feedback on Password Strength. Presented at the IEEE eCrime Symposium, San Diego, California, (pp. 70-78). https://doi.org/10.1109/ECRIME.2018.8376210
- Khadeer, M.*, Dupuis, M., & Khadeer, S.** (2017). Educating Consumers on the Security and Privacy of Internet of Things (IoT) Devices: A Quantifiable Security Compliance Measurement System to Aid in Purchasing Decisions. Presented at the The Colloquium for Information Systems Security Education, Las Vegas, Nevada.
- Dupuis, M., & Khadeer, S.** (2016). Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat. RIIT ’16: Proceedings of the 5th Annual Conference on Research in Information Technology (pp. 35–40). ACM Press. http://doi.org/10.1145/2978178.2978185
- Dupuis, M., Crossler, R., & Endicott-Popovsky, B. (2016). Measuring the Human Factor in Information Security and Privacy. In The 49th Hawaii International Conference on System Sciences (HICSS) (pp. 3676-3685). Kauai, Hawaii: IEEE. http://doi.org/10.1109/HICSS.2016.459
- Dupuis, M., & Endicott-Popovsky, B. (2014). Managing Information Security Curriculum when Facing Course Scheduling Challenges: A Case Study. In The Colloquium for Information Systems Security Education. San Diego, CA.
- Dupuis, M., Menking, A.*, & Mason, R. (2014). Perceptions of Walls: An Exploration of Trait Affect and Personality in a Cross Cultural Study of Perception of Risks Related to the Edward Snowden Case. Presented at the iConference, Berlin, Germany, (pp. 444-461). https://doi.org/10.9776/14010
- Mason, R., & Dupuis, M. (2014). Cultural Values, Information Sources, and Perceptions of Security. Presented at the iConference, Berlin, Germany, (pp. 778-783). https://doi.org/10.9776/14010
- Dupuis, M., Endicott-Popovsky, B., & Crossler, R. (2013). An Analysis of the Use of Amazon’s Mechanical Turk for Survey Research in the Cloud. Presented at the International Conference on Cloud Security Management, Seattle, Washington.
- Dupuis, M., Crossler, R., & Endicott-Popovsky, B. (2012). The Information Security Behavior of Home Users: Exploring a User’s Risk Tolerance and Past Experiences in the Context of Backing Up Information. Presented at the The Dewald Roode Information Security Workshop, Provo, Utah.
- Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I., & Du, Y.* (2010). Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion. Presented at the Asia Pacific Economic Association Conference, Hong Kong, China.
Refereed Extended Abstracts
- Dupuis, M. and Smith, S.* (2020). Clickthrough Testing for Real-World Phishing Simulations. In The 21st Annual Conference on Information Technology Education (SIGITE ’20), October 7–9, 2020, Virtual Event, USA. ACM, New York, NY, USA, 1 page. https://doi.org/10.1145/3368308.3415443
- Dupuis, M. (2018). Co-Op Light: Developing a Cybersecurity Workforce through Academia-Industry Partnerships. In Proceedings of ACM SIGITE conference (SIGITE ’18). Fort Lauderdale, FL, USA, (p. 156). https://doi.org/10.1145/3241815.3241880
- Dupuis, M. (2016). “Wait, Do I Know You?”: A Look at Personality and Preventing One’s Personal Information from being Compromised. RIIT ’16: Proceedings of the 5th Annual Conference on Research in Information Technology (p. 55–55). ACM Press. http://doi.org/10.1145/2978178.2978190
- Dupuis, M. (2014). The Art of Cyber Warfare: An Exploration of Classic Military Strategies and the Threat Against Home Users. Presented at the International Conference on Cyber Warfare, West Lafayette, Indiana, USA.
- Bang, S.**, Chung, S., Choh, Y.**, & Dupuis, M. (2013). A Grounded Theory Analysis of Modern Web Applications – Knowledge, Skills, and Abilities for DevOps. Presented at the Conference on Research in Information Technology, Orlando, Florida (pp. 61-62). ACM Press. http://dx.doi.org/10.1145/2512209.2512229
Other Publications
- Renaud, K. and Dupuis, M. (2019). Should we scare people into behaving securely? Network Security, November 2019. ISSN: 1353-4858.
- Dupuis, M. (2014). “The Role of Trait Affect in the Information Security Behavior of Home Users.” University of Washington (Seattle, Washington). (Dissertation)
Book Contributions
- Endicott-Popovsky, B. and Moss, M. (eds.) with Dupuis, M. (2015). “Is Digital Different?” Facet Publishing: London (U.K.). ISBN: 9781856048545