Takip et
Timothy Kelley
Timothy Kelley
indiana.edu üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Trust as a human factor in holistic cyber security risk assessment
D Henshel, MG Cains, B Hoffman, T Kelley
Procedia Manufacturing 3, 1117-1124, 2015
872015
Factors in an end user security expertise instrument
P Rajivan, P Moriano, T Kelley, LJ Camp
Information & Computer Security 25 (2), 190-205, 2017
692017
Comparative eye tracking of experts and novices in web single sign-on
M Arianezhad, LJ Camp, T Kelley, D Stebila
Proceedings of the third ACM conference on Data and application security and …, 2013
362013
Statistical models for predicting threat detection from human behavior
T Kelley, MJ Amon, BI Bertenthal
Frontiers in psychology 9, 332818, 2018
312018
Attention and past behavior, not security knowledge, modulate users’ decisions to login to insecure websites
T Kelley, BI Bertenthal
Information & Computer Security 24 (2), 164-176, 2016
262016
Real-world decision making: Logging into secure vs. insecure websites
T Kelley, BI Bertenthal
Proceedings of the USEC 16 (10.14722), 2016
132016
Online promiscuity: Prophylactic patching and the spread of computer transmitted infections
T Kelley, LJ Camp
The Economics of Information Security and Privacy, 157-180, 2013
132013
Emotional dissonance among frontline hospitality employees: An exploratory study examining habituation theory using fMRI
WD Choi, T Kelley, E Walden, B McCool, M O’Boyle
Journal of Hospitality & Tourism Research 46 (1), 174-188, 2022
112022
What Can Johnny Do?–Factors in an End-User Expertise Instrument.
P Rajivan, P Moriano, T Kelley, LJ Camp
HAISA, 199-208, 2016
112016
Tracking Risky Behavior On The Web: Distinguishing Between What Users ‘Say' And ‘Do'
T Kelley, BI Bertenthal
Ninth International Symposium on Human Aspects of Information Security …, 2015
102015
Filtering ip source spoofing using feasible path reverse path forwarding with sdn
K Benton, LJ Camp, T Kelley, M Swany
2015 IEEE Conference on Communications and Network Security (CNS), 733-734, 2015
62015
Self-identified experts lost on the interwebs: The importance of treating all results as learning experiences
T Kelley, LJ Camp, S Lien, D Stebila
Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012
62012
Instrument for measuring computing and security expertise
LJ Camp, T Kelley, P Rajivan
tech. report TR715, 2015
52015
Delayed judgments of learning are associated with activation of information from past experiences: A neurobiological examination
TD Kelley, DA McNeely, MJ Serra, T Davis
Psychological Science 32 (1), 96-108, 2021
42021
Grifting in the digital age
S Das, D Kim, T Kelley, LJ Camp
PrivacyCon, 2018
42018
Instrument for Measuring Computing and Security Expertise–TR715
J Camp, T Kelley, P Rajivan
Technical Report, 0
1
Pupil size influences learners' judgments of learning
T Kelley
2021
Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN
K Benton, LJ Camp, T Kelley, M Swany
International Journal of Computer and Communication Engineering 5 (6), 441, 2016
2016
Hardening Software Defined Networks
J Camp, R Anderson, INDIANA UNIV AT BLOOMINGTON
2014
Systemic effects of human factors in information security
TD Kelley
Indiana University, 2014
2014
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20