C. Jordan Howell
YOU?
Author Swipe
View article: Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions
Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions Open
View article: Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions
Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions Open
Introduction The effectiveness of human-centric cybersecurity largely depends on end-users’ adherence to security and privacy behaviors. Understanding and predicting variations in the adoption of these safeguards is crucial for both theore…
View article: Vendor Communication Themes in Darknet Ransomware-as-A-Service (Raas) Advertisements
Vendor Communication Themes in Darknet Ransomware-as-A-Service (Raas) Advertisements Open
View article: Violations of Emergent Norms Regarding COVID-19 Mitigation and Social Hygiene: An Application of Agnew’s General Theory of Crime
Violations of Emergent Norms Regarding COVID-19 Mitigation and Social Hygiene: An Application of Agnew’s General Theory of Crime Open
This study examines self-reported violations of emergent norms and regulations regarding COVID-19 mitigation and social hygiene practices among a sample of high school students randomly selected from public schools in Rasht, Iran. The stud…
View article: Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds
Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds Open
View article: The Moderating Role of Thoughtfully Reflective Decision-Making on the Relationship between Information Security Messages and SMiShing Victimization: An Experiment
The Moderating Role of Thoughtfully Reflective Decision-Making on the Relationship between Information Security Messages and SMiShing Victimization: An Experiment Open
Security messages, as a form of information security awareness training, are designed to encourage individuals to make an informed security decision, reducing their susceptibility to online victimization. To date, no known study has assess…
View article: Open Source Intelligence in Online Stolen Data Markets: Assessment of Network Disruption Strategies
Open Source Intelligence in Online Stolen Data Markets: Assessment of Network Disruption Strategies Open
View article: The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces
The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces Open
View article: The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces
The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces Open
View article: Situational Awareness and Public Wi-Fi Users’ Self-Protective Behaviors
Situational Awareness and Public Wi-Fi Users’ Self-Protective Behaviors Open
Accessing public Wi-Fi networks can be as dangerous as it is convenient. People who access a public Wi-Fi network should engage in self-protective behaviors to keep their data safe from malicious actors on the same network as well as perso…
View article: Self-Protection in Cyberspace: Assessing the Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, and Victimization
Self-Protection in Cyberspace: Assessing the Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, and Victimization Open
The current study, using structural equation modeling, assesses the processual relationship between thoughtfully reflective decision making (TRDM), theoretical constructs derived from protection motivation theory (PMT), cyber hygiene, and …
View article: The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach
The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach Open
Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be …
View article: Situational Awareness and Public Wi-Fi Users’ Self-Protective Behaviors
Situational Awareness and Public Wi-Fi Users’ Self-Protective Behaviors Open
Accessing public Wi-Fi networks can be as dangerous as it is convenient. People who access a public Wi-Fi network should engage in self-protective behaviors to keep their data safe from malicious actors on the same network as well as perso…
View article: The Predictive Ability of Self-Control and Differential Association on Sports Fans' Decision to Engage in Cyber Bullying Perpetration against Rivals
The Predictive Ability of Self-Control and Differential Association on Sports Fans' Decision to Engage in Cyber Bullying Perpetration against Rivals Open
A sample of 318 students from two Iranian universities was employed to conduct a test of Gottfredson and Hirschi’s self-control theory and elements of Akers’ social learning theory. Specifically, we sought to determine whether these th…
View article: System Trespasser Behavior After Exposure To Warning Messages At A Chinese Computer Network: An Examination
System Trespasser Behavior After Exposure To Warning Messages At A Chinese Computer Network: An Examination Open
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current st…
View article: The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System
The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System Open
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study …