Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Personnel
biblio
Behavior Modeling for Cybersecurity
Submitted by grigby1 on Tue, 03/30/2021 - 12:03pm
behavior modeling
cyber security incidents
Cybersecurity
faulty code
Human behavior
human behaviors
human behaviour modeling
Human Factors
Personnel
pubcrawl
scanning devices
security
security of data
soft factors
software developers
system administrators
biblio
The Role of Individual Differences as Predictors of Trust in Autonomous Security Robots
Submitted by grigby1 on Wed, 02/03/2021 - 1:44pm
ASR
Atmospheric measurements
automation
autonomous robots
autonomous security robots
Human behavior
Human Factors
human-robot interaction
individual differences
individual differences factors
mobile robots
Particle measurements
PAS
perfect automation schema
Personnel
pubcrawl
public reactions
regression analysis
Reliability
resilience
Resiliency
Robot Trust
robots
security
trust
biblio
Modified Grey Wolf Optimization(GWO) based Accident Deterrence in Internet of Things (IoT) enabled Mining Industry
Submitted by aekwall on Mon, 01/11/2021 - 1:38pm
IoT
Scalability
Internet of Things
Internet of Things (IoT)
Resiliency
Human behavior
pubcrawl
production engineering computing
optimisation
computerised monitoring
Personnel
Deterrence
patient monitoring
grey systems
grey wolf optimization
Accident
accident deterrence
health conditions
Heart rate
industrial accidents
Introduction
mine workers
mining industry
occupational health
occupational safety
biblio
A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats
Submitted by grigby1 on Tue, 12/01/2020 - 1:59pm
cyclic process
enterprise risk management activities
Human behavior
human trust
Insider Threats
insider threats risk
on-going process
People Process and Technology
Personnel
potential employees
pubcrawl
risk management
risk mitigation
security of data
software engineering
Trusted Computing
trusted human framework
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
Companies
data analysis
Data Breach
employees
financial data processing
financial investment
humble inquiry
Interviews
Investment
organisational aspects
organization security division
participatory action research
Personnel
policy-based governance
post-breach security
post-breach security changes
Productivity
pubcrawl
security behaviour
security breach
security controls
security culture
security division
security of data
security policies
Security Policies Analysis
security theatre
Task Analysis
zero risk appetite
biblio
Issues and Trends in Information Security Policy Compliance
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
Compliance
computer security
Industry 4.0
information and communication technology
information governance
information leakage threats
information security
information security incidents
information security management
information security policy
information security policy compliance
ISP
organizational information security policies
Organizations
Personnel
policy-based governance
pubcrawl
security behaviour
security of data
Security Policies Analysis
Standards organizations
threats
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organization
Submitted by grigby1 on Fri, 11/20/2020 - 2:15pm
security of data
organisational aspects
pubcrawl
Human Factors
policy-based governance
collaboration
Mathematical model
Data models
information security
computer security
Task Analysis
security performance
Electronic mail
Personnel
information security policy
information security policy compliance
autonomy
behavioral research
competence
employees motivation
Fortune 600 organization
intrinsic motivation
ISP compliance intentions
perceived legitimacy
perceived value congruence
relatedness
Saudi Arabia
Security policy compliant behaviour
self-determination theory
variable perceived value congruence
Security Policies Analysis
biblio
A Study on The Factors Affecting The Continuous Use of E-Government Services - Focused on Privacy and Security Concerns-
Submitted by grigby1 on Fri, 10/16/2020 - 11:10am
4th Industrial Revolution
Acceptance intention of E-government
collaboration
continuous use intention
Cybersecurity
data privacy
E-Government
e-government service
e-government services
Electronic government
government data processing
Human behavior
information and communication technology
information quality
information system
Information systems
internet
IS access model
Personnel
policy-based governance
privacy
privacy concerns
pubcrawl
quality factors
Quality of E-Government Services
quality of service
Reliability of E-government
resilience
Resiliency
risk factors
security
security concerns
service quality
Smart PLS
SPSS
system quality
TAM
technology acceptance model
user satisfaction
User satisfaction of E-Government Services
biblio
FraudFind: Financial fraud detection by analyzing human behavior
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
security of data
Organizations
real-time systems
Electronic mail
Human behavior
pubcrawl
tools
Cybersecurity
Data mining
Personnel
fraud
behavioural sciences computing
financial data processing
Banking
auditing
human factor
Human Factors
bank fraud
Continuous Audit
financial audit model
financial fraud detection
fraud triangle theory
FraudFind
payroll employees
semantic techniques
senior managers
triangle of fraud
Human Behavior and Cybersecurity
biblio
PRETSA: Event Log Sanitization for Privacy-aware Process Discovery
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
Analytical models
Business
business data processing
Compositionality
data deletion
Data mining
data privacy
Data Sanitization
differential privacy
event data
event log sanitization
Human behavior
Human Factors
Information systems
performance-annotated process model
Personnel
PRETSA
privacy
privacy guarantees
privacy-aware process discovery
Privacy-aware Process Mining
privacy-disclosure attacks
process discovery
process execution
process model discovery
pseudonymized employee information
pubcrawl
resilience
Resiliency
Scalability
security of data
sensitive information
1
2
3
next ›
last »