Most Popular Papers *
Information Security Awareness and Behavior of Smartphone Users in the Ibadan Metropolis, Nigeria
Funmilola Olubunmi Omotayo
Optimizing Information Security In Cloud Environments: A Risk Management Approach And Guide For Enterprise Cloud Security
Joshua Olusegun Oyeniyi and Oluwashina Akinloye Oyeniran
Diversifying Cybersecurity: Evaluation of an Internet of Things (IoT)-Based Cybersecurity Training Course Designed to Bridge the Diversity Gap
Maureen Namukasa, Bhoomin B. Chauhan, Carlie Swords, Curtice Gough, Weronika Dymanus, Catherine Diresta, John Vitali, Vivek Sharma, TJ OConnor, and Meredith Carroll
The Impact of AI Use in Programming Courses on Critical Thinking Skills
Christian Jay St Francis Clarke and Abdullah Konak
The National Cybersecurity Teaching Coalition: Expanding Cybersecurity Education Opportunities
Paul Wagner, Melissa Dark, Robert Honomichl, Filipo Sharevski, and Sandra Leiterman
The Effectiveness of Scenario-Based Cybersecurity Day Camps in Southern Rural Appalachia
Anna P. Rodgers-Stine and Tania Williams
Comparing Cognitive Theories of Learning Transfer to Advance Cybersecurity Instruction, Assessment, and Testing
Daniel T. Hickey Ph.D. and Ronald J. Kantor
The 2020 Twitter Hack – So Many Lessons to Be Learned
Paul D. Witman and Scott Mackelprang
Car Hacking: Accessing and Exploiting the CAN Bus Protocol
Bryson R. Payne
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 09/08/25.