Follow
Timothy Kelley
Title
Cited by
Cited by
Year
Trust as a human factor in holistic cyber security risk assessment
D Henshel, MG Cains, B Hoffman, T Kelley
Procedia Manufacturing 3, 1117-1124, 2015
842015
Factors in an end user security expertise instrument
P Rajivan, P Moriano, T Kelley, LJ Camp
Information & Computer Security 25 (2), 190-205, 2017
682017
Comparative eye tracking of experts and novices in web single sign-on
M Arianezhad, LJ Camp, T Kelley, D Stebila
Proceedings of the third ACM conference on Data and application security and …, 2013
362013
Statistical models for predicting threat detection from human behavior
T Kelley, MJ Amon, BI Bertenthal
Frontiers in psychology 9, 332818, 2018
302018
Attention and past behavior, not security knowledge, modulate users’ decisions to login to insecure websites
T Kelley, BI Bertenthal
Information & Computer Security 24 (2), 164-176, 2016
242016
Online promiscuity: Prophylactic patching and the spread of computer transmitted infections
T Kelley, LJ Camp
The Economics of Information Security and Privacy, 157-180, 2013
132013
Real-world decision making: Logging into secure vs. insecure websites
T Kelley, BI Bertenthal
Proceedings of the USEC 16 (10.14722), 2016
122016
Tracking Risky Behavior On The Web: Distinguishing Between What Users ‘Say' And ‘Do'
T Kelley, BI Bertenthal
Ninth International Symposium on Human Aspects of Information Security …, 2015
102015
Emotional dissonance among frontline hospitality employees: An exploratory study examining habituation theory using fMRI
WD Choi, T Kelley, E Walden, B McCool, M O’Boyle
Journal of Hospitality & Tourism Research 46 (1), 174-188, 2022
92022
What Can Johnny Do?–Factors in an End-User Expertise Instrument.
P Rajivan, P Moriano, T Kelley, LJ Camp
HAISA, 199-208, 2016
92016
Filtering ip source spoofing using feasible path reverse path forwarding with sdn
K Benton, LJ Camp, T Kelley, M Swany
2015 IEEE Conference on Communications and Network Security (CNS), 733-734, 2015
62015
Self-identified experts lost on the interwebs: The importance of treating all results as learning experiences
T Kelley, LJ Camp, S Lien, D Stebila
Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012
62012
Instrument for measuring computing and security expertise
LJ Camp, T Kelley, P Rajivan
tech. report TR715, 2015
52015
Delayed judgments of learning are associated with activation of information from past experiences: A neurobiological examination
TD Kelley, DA McNeely, MJ Serra, T Davis
Psychological Science 32 (1), 96-108, 2021
42021
Grifting in the digital age
S Das, D Kim, T Kelley, LJ Camp
PrivacyCon, 2018
42018
Instrument for Measuring Computing and Security Expertise–TR715
J Camp, T Kelley, P Rajivan
Technical Report, 0
1
Pupil size influences learners' judgments of learning
T Kelley
2021
Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN
K Benton, LJ Camp, T Kelley, M Swany
International Journal of Computer and Communication Engineering 5 (6), 441, 2016
2016
Hardening Software Defined Networks
J Camp, R Anderson, INDIANA UNIV AT BLOOMINGTON
2014
Systemic effects of human factors in information security
TD Kelley
Indiana University, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20