* Graduate Student Contributor; ** Undergraduate Student Contributor

Refereed Journal Articles

  1. Dupuis, M. and Renaud, K. (2020). Scoping the Ethical Principles of Cybersecurity Fear Appeals. Ethics and Information Technology. (accepted: in production)
  2. Dupuis, M. and Williams, A.* (2020). Information Warfare: Memes and their Attack on our Most Valued Critical Infrastructure—the Democratic Institution Itself. Journal of Systemics, Cybernetics and Informatics: JSCI, 18(2), 44-54.
  3. Khadeer, M.*, Dupuis, M., & Khadeer, S.** (2018). Educating Consumers on the Security and Privacy of Internet of Things (IoT) Devices: A Quantifiable Security Compliance Measurement System to Aid in Purchasing Decisions. Journal of the Colloquium for Information Systems Security Education, 5(2), 60-81.
  4. Dupuis, M., Khadeer, S.**, & Huang, J.** (2017). “I Got the Job!”: An exploratory study examining the psychological factors related to status updates on facebook. Computers in Human Behavior, 73, 132-140.
  5. Dupuis, M. (2017). Cyber Security for Everyone: An Introductory Course for Non-Technical Majors. Journal of Cybersecurity Education, Research, and Practice, 2017 (1, Article 3).
  6. Thompson, T., Dupuis, M., Goda, B., Bai, Y., Costarella, C., & Zantua, M. (2015). Systems Thinking Pedagogical Design: Developing a Veteran-Centric Master’s Degree in Cybersecurity and Leadership. Special Edition of The Colloquium for Information Systems Security Education: Educational Approaches to Transition Former Military Personnel into the Cyber Security Field, 2(2), 163-183.
  7. Zantua, M., & Dupuis, M. (2015). Re-engineering the Cybersecurity Human Capital Crisis. Special Edition of The Colloquium for Information Systems Security Education: Educational Approaches to Transition Former Military Personnel into the Cyber Security Field, 2(2), 156-162
  8. Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I., & Du, Y.* (2011). Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion. China-USA Business Review, 319-336.

Refereed Conference Papers

  1. Dupuis, M. and Renaud, K. (2020). Conducting “In-Person” Research During a Pandemic. In The 21st Annual Conference on Information Technology Education (SIGITE ’20), October 7–9, 2020, Virtual Event, USA. ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3368308.3415420
  2. Dupuis, M., Shorb, J.*, Walker, J.*, Holt, F.B., and McIntosh, M. (2020). Do You See What I See? The Use of Visual Passwords for Authentication. In The 21st Annual Conference on Information Technology Education (SIGITE ’20), October 7–9, 2020, Virtual Event, USA. ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3368308.3415458
  3. Williams, A.* & Dupuis, M. (2020). I Don’t Always Spread Disinformation on the Web, but When I do I Like to Use Memes: An Examination of Memes in the Spread of Disinformation. 24th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2020, Orlando, Florida, March 10-13, 2020, (pp. 165-172). Best Paper Award Winner
  4. Renaud, K. & Dupuis, M. (2019). Cyber Security Fear Appeals: Unexpectedly Complicated. In Proceedings of 2019 New Security Paradigms Workshop, San Carlos, Costa Rica, September 23–26, 2019 (NSPW ’19), (pp. 42-56). https://doi.org/10.1145/3368860.3368864
  5. Dupuis, M., Geiger, T.*, Slayton, M.*, & Dewing, F. (2019, September). The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?. In Proceedings of the 20th Annual SIG Conference on Information Technology Education (pp. 81-86). ACM. https://doi.org/10.1145/3349266.3351419
  6. Nguyen, J.* & Dupuis, M. (2019, September). Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and Operations. In Proceedings of the 20th Annual SIG Conference on Information Technology Education (pp. 93-98). ACM. https://doi.org/10.1145/3349266.3351420
  7. Chang, Y.-T.*, & Dupuis, M. (2019). My Voiceprint Is My Authenticator: A Two-layer Authentication Approach Using Voiceprint for Voice Assistants. 2019 IEEE International Conference on Advanced & Trusted Computing, (pp. 1318–1325). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00243
  8. Dupuis, M. (2019). Going Back for that One Last Thing in the House on Fire: How Fear, Attentiveness, Sadness, Joviality, and Other Lower Order Dimensions of Affect Influence Our Security and Privacy Behavior. 2019 IEEE International Conference on Internet of People, (pp. 1825–1833). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00322
  9. Dupuis, M., Bejan, C., Bishop, M., David, S., & Lagesse, B. (2019). Design Patterns for Compensating Controls for Securing Financial Sessions. 2019 IEEE International Workshop on Security Measurements of Cyber Networks (SMCN), (pp. 1437–1443). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00260
  10. Dupuis, M., Pham, S.*, & Weiss, M.* (2019). Facebook vs. Twitter: An Examination of Differences in Behavior Type and Substance Based on Psychological Factors. 2019 IEEE International Conference on Internet of People, (pp. 1834–1840). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00323
  11. Dupuis, M., & Williams, A.* (2019). The Spread of Disinformation on the Web: An Examination of Memes on Social Networking. 2019 IEEE International Conference on Advanced & Trusted Computing, (pp. 1412–1418). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00256
  12. Dupuis, M., & Weiss, M.* (2019). Veterans and their Inherent Cybersecurity Preparedness: Myth or Reality? 2019 IEEE International Conference on Internet of People, (pp. 1841–1845). https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00324
  13. Dupuis, M., Slayton, M.*, Geiger, T.*, & Dewing, F. (2019). Cybersecurity Behavior: Current Trends in the Use of Protective Measures and Reasons Why They Aren’t Used. Presented at the The Colloquium for Information Systems Security Education, Las Vegas, Nevada.
  14. Dupuis, M., Crossler, R. (2019). The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals. In The 52nd Hawaii International Conference on System Sciences (HICSS). Maui, Hawaii: IEEE, (pp. 4841-4850). http://doi.org/10.24251/HICSS.2019.584
  15. Dupuis, M., & Ebenezer, M.* (2018). Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices. In Proceedings of ACM SIGITE conference (SIGITE ’18). Fort Lauderdale, FL, USA, (pp. 117-122). https://doi.org/10.1145/3241815.3241869
  16. Dupuis, M. & Gordon, C.* (2018). Evaluating Prevalence, Perceptions, and Effectiveness of Cyber Security and Privacy Education, Training, and Awareness Programs. Presented at the The Colloquium for Information Systems Security Education, New Orleans, Louisiana.
  17. Dupuis, M. & Khan, F.* (2018). Effects of Peer Feedback on Password Strength. Presented at the IEEE eCrime Symposium, San Diego, California, (pp. 70-78). https://doi.org/10.1109/ECRIME.2018.8376210
  18. Khadeer, M.*, Dupuis, M., & Khadeer, S.** (2017). Educating Consumers on the Security and Privacy of Internet of Things (IoT) Devices: A Quantifiable Security Compliance Measurement System to Aid in Purchasing Decisions. Presented at the The Colloquium for Information Systems Security Education, Las Vegas, Nevada.
  19. Dupuis, M., & Khadeer, S.** (2016). Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat. RIIT ’16: Proceedings of the 5th Annual Conference on Research in Information Technology (pp. 35–40). ACM Press. http://doi.org/10.1145/2978178.2978185
  20. Dupuis, M., Crossler, R., & Endicott-Popovsky, B. (2016). Measuring the Human Factor in Information Security and Privacy. In The 49th Hawaii International Conference on System Sciences (HICSS) (pp. 3676-3685). Kauai, Hawaii: IEEE. http://doi.org/10.1109/HICSS.2016.459
  21. Dupuis, M., & Endicott-Popovsky, B. (2014). Managing Information Security Curriculum when Facing Course Scheduling Challenges: A Case Study. In The Colloquium for Information Systems Security Education. San Diego, CA.
  22. Dupuis, M., Menking, A.*, & Mason, R. (2014). Perceptions of Walls: An Exploration of Trait Affect and Personality in a Cross Cultural Study of Perception of Risks Related to the Edward Snowden Case. Presented at the iConference, Berlin, Germany, (pp. 444-461). https://doi.org/10.9776/14010
  23. Mason, R., & Dupuis, M. (2014). Cultural Values, Information Sources, and Perceptions of Security. Presented at the iConference, Berlin, Germany, (pp. 778-783). https://doi.org/10.9776/14010
  24. Dupuis, M., Endicott-Popovsky, B., & Crossler, R. (2013). An Analysis of the Use of Amazon’s Mechanical Turk for Survey Research in the Cloud. Presented at the International Conference on Cloud Security Management, Seattle, Washington.
  25. Dupuis, M., Crossler, R., & Endicott-Popovsky, B. (2012). The Information Security Behavior of Home Users: Exploring a User’s Risk Tolerance and Past Experiences in the Context of Backing Up Information. Presented at the The Dewald Roode Information Security Workshop, Provo, Utah.
  26. Dupuis, M., Endicott-Popovsky, B., Wang, H., Subramaniam, I., & Du, Y.* (2010). Top-Down Mandates and the Need for Organizational Governance, Risk Management, and Compliance in China: A Discussion. Presented at the Asia Pacific Economic Association Conference, Hong Kong, China.

Refereed Extended Abstracts

  1. Dupuis, M. and Smith, S.* (2020). Clickthrough Testing for Real-World Phishing Simulations. In The 21st Annual Conference on Information Technology Education (SIGITE ’20), October 7–9, 2020, Virtual Event, USA. ACM, New York, NY, USA, 1 page. https://doi.org/10.1145/3368308.3415443
  2. Dupuis, M. (2018). Co-Op Light: Developing a Cybersecurity Workforce through Academia-Industry Partnerships. In Proceedings of ACM SIGITE conference (SIGITE ’18). Fort Lauderdale, FL, USA, (p. 156). https://doi.org/10.1145/3241815.3241880
  3. Dupuis, M. (2016). “Wait, Do I Know You?”: A Look at Personality and Preventing One’s Personal Information from being Compromised. RIIT ’16: Proceedings of the 5th Annual Conference on Research in Information Technology (p. 55–55). ACM Press. http://doi.org/10.1145/2978178.2978190
  4. Dupuis, M. (2014). The Art of Cyber Warfare: An Exploration of Classic Military Strategies and the Threat Against Home Users. Presented at the International Conference on Cyber Warfare, West Lafayette, Indiana, USA.
  5. Bang, S.**, Chung, S., Choh, Y.**, & Dupuis, M. (2013). A Grounded Theory Analysis of Modern Web Applications – Knowledge, Skills, and Abilities for DevOps. Presented at the Conference on Research in Information Technology, Orlando, Florida (pp. 61-62). ACM Press. http://dx.doi.org/10.1145/2512209.2512229

Other Publications

  1. Renaud, K. and Dupuis, M. (2019). Should we scare people into behaving securely? Network Security, November 2019. ISSN: 1353-4858.
  2. Dupuis, M. (2014). “The Role of Trait Affect in the Information Security Behavior of Home Users.” University of Washington (Seattle, Washington). (Dissertation)

Book Contributions

  1. Endicott-Popovsky, B. and Moss, M. (eds.) with Dupuis, M. (2015). “Is Digital Different?” Facet Publishing: London (U.K.). ISBN: 9781856048545