Frequently Asked Questions - Human Centric Security
Questions:
- The Cloud’s DNA
- Secure, Composable, & Scalable Framework for Trusted Collaborative Computing
- Assessing the Relationship between Hacking and Various Personality Traits
- Categorization of Various Types of Online Pornography Users & Personality Assessments
- A Context-Driven Security Framework for Distributed Healthcare Domain
- Human Factors in Online Security and Privacy
- Mining Transaction Streams to Infer Semantic Relations
- Leveraging Social Trust in Building Secure Email Networks
- Predictive Blacklisting for Detecting Phishing Attacks
- Information Security Ethics and Social Issues: A Moral Development/Constructivist Approach
- Information Assurance & Security Ethics in Complex Systems: Interdisciplinary Perspectives
- A Welfare Economic Analysis of Data Breach Disclosure Policy in the United States
- Group Performance Environments Research (GROUPER) Lab
- Enhancing High Fidelity Ten Print Capture for Deparment of Homeland Security
- Preserving Privacy in Social Network Data
- Text Extraction and Data Visualization for Pet Health Surveillance
- Exploring Risk Perception and Ultimate Trust in Online Environments: Viewpoints of the Visually-Impa
- Assessing Risk of Insider Threats to Information Systems
- Training Knowledge & Skills for the Networked Battlefield
- Information Assurance and Security Curriculum and Faculty Development
- A Multi-site Study of How Medical Surgical Medical Nurses Spend Their Time: a Baseline
- Improving the Privacy and Security of Online Survey Data Collection, Storage, and Processing
- Assessment and Enhancement of Awareness Training and Security
Q:
The Cloud’s DNA
A:
Q:
Secure, Composable, & Scalable Framework for Trusted Collaborative Computing
A:
Q:
Assessing the Relationship between Hacking and Various Personality Traits
A:
Q:
Categorization of Various Types of Online Pornography Users & Personality Assessments
A:
Q:
A Context-Driven Security Framework for Distributed Healthcare Domain
A:
Q:
Human Factors in Online Security and Privacy
A:
Q:
Mining Transaction Streams to Infer Semantic Relations
A:
Q:
Leveraging Social Trust in Building Secure Email Networks
A:
Q:
Predictive Blacklisting for Detecting Phishing Attacks
A:
Q:
Information Security Ethics and Social Issues: A Moral Development/Constructivist Approach
A:
Q:
Information Assurance & Security Ethics in Complex Systems: Interdisciplinary Perspectives
A:
Q:
A Welfare Economic Analysis of Data Breach Disclosure Policy in the United States
A:
Q:
Group Performance Environments Research (GROUPER) Lab
A:
Q:
Enhancing High Fidelity Ten Print Capture for Deparment of Homeland Security
A:
Q:
Preserving Privacy in Social Network Data
A:
Q:
Text Extraction and Data Visualization for Pet Health Surveillance
A:
Q:
Exploring Risk Perception and Ultimate Trust in Online Environments: Viewpoints of the Visually-Impa
A:
Q:
Assessing Risk of Insider Threats to Information Systems
A:
Q:
Training Knowledge & Skills for the Networked Battlefield
A:
Q:
Information Assurance and Security Curriculum and Faculty Development
A:
Q:
A Multi-site Study of How Medical Surgical Medical Nurses Spend Their Time: a Baseline
A:
Q:
Improving the Privacy and Security of Online Survey Data Collection, Storage, and Processing
A:
Q:
Assessment and Enhancement of Awareness Training and Security
A: