Author of the publication

Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals.

, , , and . Inf. Technol. Dev., 20 (2): 196-213 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systems Approach to Countermeasures in Credibility Assessment Interviews., , , and . ICIS, Association for Information Systems, (2013)When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns., , , and . ICIS, Association for Information Systems, (2015)Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management., , and . ICIS, Association for Information Systems, (2014)Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews., , , and . ISI, page 97-102. IEEE, (2015)Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test.. EISIC, page 269-272. IEEE, (2013)Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance., , and . HICSS, page 325-334. IEEE Computer Society, (2013)Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews., , and . Decis. Support Syst., (2016)Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , and . Inf. Technol. Dev., 20 (2): 196-213 (2014)The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation., , , , , and . EISIC, page 252-255. IEEE, (2013)More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions., , , and . J. Manag. Inf. Syst., 33 (2): 332-360 (2016)