Trust as a human factor in holistic cyber security risk assessment D Henshel, MG Cains, B Hoffman, T Kelley Procedia Manufacturing 3, 1117-1124, 2015 | 91 | 2015 |
Factors in an end user security expertise instrument P Rajivan, P Moriano, T Kelley, LJ Camp Information & Computer Security 25 (2), 190-205, 2017 | 69 | 2017 |
Comparative eye tracking of experts and novices in web single sign-on M Arianezhad, LJ Camp, T Kelley, D Stebila Proceedings of the third ACM conference on Data and application security and …, 2013 | 37 | 2013 |
Statistical models for predicting threat detection from human behavior T Kelley, MJ Amon, BI Bertenthal Frontiers in psychology 9, 466, 2018 | 31 | 2018 |
Attention and past behavior, not security knowledge, modulate users’ decisions to login to insecure websites T Kelley, BI Bertenthal Information & Computer Security 24 (2), 164-176, 2016 | 26 | 2016 |
Emotional dissonance among frontline hospitality employees: An exploratory study examining habituation theory using fMRI WD Choi, T Kelley, E Walden, B McCool, M O’Boyle Journal of Hospitality & Tourism Research 46 (1), 174-188, 2022 | 13 | 2022 |
Real-world decision making: Logging into secure vs. insecure websites T Kelley, BI Bertenthal Proceedings of the USEC 16 (10.14722), 2016 | 13 | 2016 |
Online promiscuity: Prophylactic patching and the spread of computer transmitted infections T Kelley, LJ Camp The Economics of Information Security and Privacy, 157-180, 2013 | 13 | 2013 |
What Can Johnny Do?–Factors in an End-User Expertise Instrument. P Rajivan, P Moriano, T Kelley, LJ Camp HAISA, 199-208, 2016 | 11 | 2016 |
Tracking Risky Behavior On The Web: Distinguishing Between What Users ‘Say' And ‘Do' T Kelley, BI Bertenthal Ninth International Symposium on Human Aspects of Information Security …, 2015 | 10 | 2015 |
Filtering ip source spoofing using feasible path reverse path forwarding with sdn K Benton, LJ Camp, T Kelley, M Swany 2015 IEEE Conference on Communications and Network Security (CNS), 733-734, 2015 | 7 | 2015 |
Self-identified experts lost on the interwebs: The importance of treating all results as learning experiences T Kelley, LJ Camp, S Lien, D Stebila Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012 | 6 | 2012 |
Delayed judgments of learning are associated with activation of information from past experiences: A neurobiological examination TD Kelley, DA McNeely, MJ Serra, T Davis Psychological Science 32 (1), 96-108, 2021 | 5 | 2021 |
Instrument for measuring computing and security expertise LJ Camp, T Kelley, P Rajivan tech. report TR715, 2015 | 5 | 2015 |
Grifting in the digital age S Das, D Kim, T Kelley, LJ Camp PrivacyCon, 2018 | 4 | 2018 |
Instrument for Measuring Computing and Security Expertise–TR715 J Camp, T Kelley, P Rajivan Technical Report, 0 | 1 | |
Pupil size influences learners' judgments of learning T Kelley | | 2021 |
Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN K Benton, LJ Camp, T Kelley, M Swany International Journal of Computer and Communication Engineering 5 (6), 441, 2016 | | 2016 |
Systemic effects of human factors in information security TD Kelley Indiana University, 2014 | | 2014 |
A Method for Increasing Transmission Rates in Covert Timing Channels T Kelley | | 2006 |