Ethical data handling is non-negotiable for online business. My paper explores the moral and legal liabilities of IP and user data, detailing the risks of collection, use, and security failure. Protect your brand trust and avoid lawsuits.
Category: Social Sciences
Victim Precipitation in Cyber Victimization & Potential Remedies
How much does user behavior contribute to cyber losses? My paper analyzes Victim Precipitation in cyberattacks and provides proven, actionable remedies—from effective training to policy changes—to minimize your human risk factor. Full ODU analysis here!
Cybercrime: Using Psychological Theories to Understand & Prevent It
To beat cybercrime, you must understand the cybercriminal. My paper uses psychological theories—like Social Learning Theory and Rational Choice Theory—to model and predict criminal behavior. Learn how to build defenses that work.
Hacking Humans
A zero-trust network isn’t enough. You need a human firewall. My research details the critical importance of human-centric defense, exposing how easily people are exploited in sophisticated attacks. Click for the Hacking Humans paper.
The Threat of Deepfakes: An Overview of Human Ability to Detect Them
The biggest threat of deepfakes isn’t the AI—it’s your brain. I detail the psychological reasons (like the “seeing-is-believing” bias) why humans fail to detect these fakes. Don’t be fooled. Read the full research!
Reducing Human Errors That Influence Data Breaches
95% of data breaches involve human error. My paper details the cognitive and organizational factors that lead to these errors and outlines technical and non-technical strategies to build a Human Firewall. Full ODU analysis here!
Managing Cybersecurity Change: Using Tactical Empathy to Overcome Resistance
Examines how tactical empathy improves cybersecurity change management by reducing resistance, strengthening communication, and supporting successful adoption of new security practices.
Security Polices from a CISO’s Perspective
Explores security policies from a CISO’s perspective, highlighting their role in governance, risk management, strategic decision-making, and building organizational security.
Human Factors Cybersecurity Engineering: Inclusive Design through Social Science
Explores how human factors and social science inform cybersecurity engineering, focusing on inclusive design, usability, error reduction, and stronger security outcomes.
Computer Security vs. Information Security
Explains the difference between computer security and information security, including their goals, scope, protective controls, and roles in organizational risk management.
“Going Dark”
An Overview and Analysis of Former FBI Director James Comey’s Security Concerns aboutLaw Enforcement and Encryption