ODU
ncatNSF

Improving Security Behavior of Employees in Cyberspace through Evidence-based Malware Reports and E-Learning Materials

About Project

    This project will contribute to the understanding of cyber security behaviors of employees and the development of more effective cyber security policies. The developed model will explain and predict how various factors affect employees' cyber security behaviors. Project results will contribute to the psychological, behavioral, and educational theories relating to the basic processes by which people assess vulnerabilities and threats, choose adaptive or maladaptive coping strategies, and adopt new coping strategies. Through educational workshops, a project portal, journal publications, and conference presentations, the results of the project will reach a broad audience that includes corporate IT directors, managers, employees, researchers and practitioners in various industries such as real estate, financial services, logistics and supply chain, insurance and education. More details on NSF website.

Faculty Members

wuhe Wu He, Ph.D. Assistant Professor of Information Technology & Decision Sciences, Old Dominion University

Dr. He's research interests include Data Mining, Information Security, Social Media, Knowledge Management and Computing Education.




xu Li Xu, Ph.D Professor & Eminent Scholar of Information Technology & Decision Sciences, Old Dominion University

Dr. Xu teaches database, data warehouse, data mining, business intelligence and other courses. Dr. Xu's research interests include MIS foundational theory and methodologies, business intelligence, enterprise information systems in e-commerce, ERP, and intelligent systems.


li Ling Li, Ph.D Professor of Information Technology & Decision Sciences, Old Dominion University

Dr. Ling Li is a certified fellow of APICS (the Association for Operations Management) in production and inventory management (CFPIM). Professor Li earned both her master's and doctorate in operations management and logistics from the Ohio State University, USA.


ash Ivan Ash, Ph.D Associate Professor of Psychology, Old Dominion University

Profiles on http://ww2.odu.edu/~iash/
anwar Mohd Anwar, Ph.D. Assistant Professor of Computer Science, North Carolina A&T State University

Dr.Anwar has experience and interest in designing usable secure, privacy-preserving, and trusted infrastructures, systems, and applications in different online contexts, specifically in Online Social Networks (OSN), e-Learning, and e-Health domains.


yuan Xiaohong Yuan, Ph.D. Professor, Department of Computer Science, North Carolina A&T State University.

Research interests: information security, secure software engineering, mobile computing, health informatics security & privacy, and information assurance education.

















































Research Assistants

tian Xin Tian, MS Ph.D Student, Old Dominion University

Research Area: Cybersecurity, Social Media, Database Administration

Xin is pursuing a Ph.D in Business Administration in Information Technology track. She is a teaching and research assistant for the department of Information Technology & Decision Sciences. Xin has experience in, web development, database and project management. Xin has received a masters degree in Computer Science and bachelors degree in Information Management and Information System, while also obtains Oracle 11g Certificate Associate.


jing Xiaotao Jing, MSGraduate Research Assistant, Old Dominion University

Research Area: Cybersecurity, Database Administration

Xiaotao holds a masters degree in Computer Science from Old Dominion University. He is currently a graduate research assistant under the supervision of Dr. He at the Department of Information Technology and Decision Sciences, and a member of this project.




Ashiq Ashiq Graduate Research Assistant, North Carolina A&T State University

Research Area: web security, cloud security, and mobile application security.

Ashiq is pursuing a master's of science degree in computer science. He is currently a research assistant under the supervision of Dr. Anwar and a teaching assistant for the computer science department. He has technical knowledge and experience in programming languages, website development, mobile application development, and cloud computing.





Zhuoning Zhuoning Yuan Undergraduate Research Assistant, North Carolina A&T State University

Research Area: online social media and cybersecurity.

Zhuoning is pursuing a bachelor's degree in Electrical Engineering. He is currently an undergraduate research assistant under the supervision of Dr. Anwar. He has programming experience in C++ and java and advanced skill of MATLAB.



































Recent Publications

  • Li, L., He, W., Ash, I., Xu, L., Anwar, M., & Yuan, X. (2014). Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? A Pilot Study. Proceedings of IEEE Conference on Enterprise Systems 2014, pp. 169-173, August 2-3, Shanghai, China.

  • He, W., Yuan, X., & Tian, X. (2014). The Self-Efficacy Variable in Behavioral Information Security Research. Proceedings of IEEE Conference on Enterprise Systems 2014, pp. 28-32, August 2-3, Shanghai, China.

  • He, W. (2014). Enhancing Secure Web Mashups Development in Enterprise Environments. Proceedings of IEEE Conference on Enterprise Systems 2014, pp. 279-283, August 2-3, Shanghai, China.

  • He, W. & Yuan, X. (2014). Behavioral Information Security Research with Emerging Technologies. Journal of Information Privacy and Security, 10(4), pp. 157-159.

  • Johnson,P., Harris,P., Henderson,K., Yuan,X., & Yang, L.(2014). A Course Module on Mobile Malware. Information Security Education Journal, Volume 1, No. 2, December 2014.

  • He, W., Ash, I., Li, L., Xu, L., Anwar, M., & Yuan, X. (2015). A Model Explaining Security Behavior of Employees in Cyberspace. Poster Presentation in The National Science Foundation Secure and Trustworthy Cyberspace (SaTC) Principal Investigators' Meeting, Arlington, VA, January 5-7, 2015.

  • He,W., Tian, X., & Shen, J. (2015). Examining Security Risks of Mobile Banking Applications through Blog Mining. Proceedings of the 26th Modern AI and Cognitive Science Conference, pp.103-108, Greensboro, NC, USA, April 25-26, 2015.

  • He, W., Ash, I., Li, L., Xu, L., Anwar, M., & Yuan, X. (2015). A Security Behavior Model of Employees in Cyberspace. Proceedings of the 21st Americas Conference on Information Systems (AMCIS 2015),Puerto Rico, USA, August 13-15, 2015.

  • He, W., Tian, X., Shen, J. & Li, Y. (2015). Understanding Mobile Banking Applications' Security risks through Blog Mining and the Workflow Technology. Proceedings of the International Conference on Information Systems 2015, Fort Worth, Texas, December 13-16. 2015

  • Anwar, M., Imran, A. (2015). Access Control for Multi-tenancy in Cloud-based Health Information Systems. In Proceedings of Cyber Security and Cloud Computing (CSCloud), pp. 104-110, IEEE.

  • Anwar, M. and Imran, A. (2015). A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication. Proceedings of the 26th Modern AI and Cognitive Science Conference, Greensboro, North Carolina, 2015, pp. 13-18.

  • He, W., Anwar, M., Ash, I., Yuan, X., Li, L., & Xu, L. (2016). A Study of Employees' Self-Reported Cybersecurity Behaviors. TREO Talk and Proceedings of the 22nd Americas Conference on Information Systems (AMCIS 2016), San Diego, USA, August 11-14, 2016.

  • Yuan, X., He, W., Yang, L. & Simpkins, L.(2016). Teaching Security Management for Mobile Devices. ACM SIGITE/RIIT 2016 conference. Boston, Massachusetts, September 28 to October 1, 2016.

  • Bachupally, Y. R., Yuan, X., & Roy, K. (2016, March). Network security analysis using Big Data technology. In SoutheastCon, 2016 (pp. 1-4). IEEE.

  • Brill, D., Dinh, A., Li, Y., & He, W. (2016). Malware Sequence Alignment. Virginia Modeling, Simulation, and Visualization Student Capstone Conference, Suffolk, VA, USA, April 14, 2016.

  • Brill, D., Li, Y. & He, W. (2016). Sequence Alignment of Malware Data. Poster presentation at Old Dominion University Undergraduate Research Symposium, February 13, 2016.

  • Tian, X. (2016). Investigating Cyberbullying in Social Media: The case of Twitter. KSU Conference on Cybersecurity Education, Research and Practice. Paper 4. http://digitalcommons.kennesaw.edu/ccerp/2016/Student/4

  • He,W., Tian,X., & Anwar,M. (2016). Developing and Using Evidence-based E-learning Videos for Cybersecurity Education.KSU Conference on Cybersecurity Education, Research and Practice.Paper 3. http://digitalcommons.kennesaw.edu/ccerp/2016/Academic/3

  • Mutahir Nadeem, Ochaun Marshall, Sarbjit Singh, Xing Fang, & Xiaohong Yuan (2016). Semi-supervised Deep Neural Network for Network Intrusion Detection, Conference on Cybersecurity Education, Research and Practice, October 29-30, 2016.

  • Tian, X. (2017).Dark Side of Social Media? Cyberbullying Case Study in Twitter. Poster presentation at the 2017 Women in Cybersecurity Conference(WiCyS), Mar 30-31, 2017, Tucson, Arizona.

  • Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.

  • Anwar, M., He, W. & Yuan, X. (2017). Cybersecurity Behavior Training for Employees. In J. Johnston (Ed.), Proceedings of EdMedia: World Conference on Educational Media and Technology 2017 (pp. 1229-1232). Association for the Advancement of Computing in Education (AACE).

  • He, W., Anwar, M., Li, L., Ash, I., Yuan, X., & Xu, L. (2017). Effects of Different Evidence-based Cybersecurity Training Methods on Employees. TREO Talk and Proceedings of the 23rd Americas Conference on Information Systems (AMCIS 2017), Boston, USA, August 10-12, 2017.

  • Dharaben Patel, Xiaohong Yuan, Kaushik Roy, & Aakiel Abernathy (2017). Analyzing Network Traffic Data Using Hive Queries, IEEE SoutheastCon 2017.

Malware Reports

Collaboration

Contact Us

  • Email: whe@odu.edu
  • Phone: 757-683-5008
  • Constant Hall 2022 Old Dominion University