Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kevin Streff is active.

Publication


Featured researches published by Kevin Streff.


IEEE Computer | 2012

Smartphone Security Challenges

Yong Wang; Kevin Streff; Sonell Raman

Because of their unique characteristics, smartphones present challenges requiring new business models that offer countermeasures to help ensure their security.Because of their unique characteristics, smartphones present challenges requiring new business models that offer countermeasures to help ensure their security.


information assurance and security | 2007

Experiences and lessons learned in the design and implementation of an Information Assurance curriculum

Sreekanth Malladi; Omar F. El-Gayar; Kevin Streff

In 2004, Dakota State University proposed a model for information assurance and computer security program development. That model provided a framework for developing undergraduate and graduate programs at DSU. This paper provides insight into experiences and lessons learned to further implement that model. The paper details modifications to both the undergraduate and graduate information assurance programs as a result of specific issues and challenges. Further, the paper highlights the introduction of a new terminal degree that includes an information assurance specialization. As a national center of excellence in information assurance education, we are confident that this paper will be helpful to universities around the world in either developing new or improving existing IA programs.


Proceedings of the 2017 International Conference on Software and e-Business | 2017

Beyond Cybersecurity Awareness: Antecedents and Satisfaction

Yazan Alshboul; Kevin Streff

Organizations develop technical and procedural measures to protect information systems. Relying only on technical based security solutions is not enough. Organizations must consider technical security solutions along with social, human, and organizational factors. The human element represents the employees (insiders) who use the information systems and other technology resources in their day-to-day operations. ISP awareness is essential to protect organizational information systems. This study adapts the Innovation Diffusion Theory to examine the antecedents of ISP awareness and its impact on the satisfaction with ISP and security practices. A sample of 236 employees in universities in the United States is collected to evaluate the research model. Results indicated that ISP quality, self-efficacy, and technology security awareness significantly impact ISP awareness. The current study presents significant contributions toward understanding the antecedents of ISP awareness and provides a starting point toward including satisfaction aspect in information security behavioral domain.


dependable autonomic and secure computing | 2006

On Recognizing Virtual Honeypots and Countermeasures

Xinwen Fu; Wei Yu; Dan Cheng; Xuejun Tan; Kevin Streff; Steve Graham


THE JOURNAL OF APPLIED BUSINESS AND ECONOMICS | 2016

Accuracy of Self Disclosed Cybersecurity Risks of Large U.S. Banks

Troy G. Bakker; Kevin Streff


americas conference on information systems | 2015

Analyzing Information Security Model for Small-Medium Sized Businesses

Yazan Alshboul; Kevin Streff


Archive | 2009

Creating a Security Education, Training, and Awareness Program

Nick Pullman; Kevin Streff


system analysis and modeling | 2008

Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary.

Patrick Henry Engebretson; Joshua J. Pauli; Kevin Streff


FECS | 2008

An Ethical Network Hacking Contest for Undergraduate Student Recruitment.

Patrick Henry Engebretson; Joshua J. Pauli; Kevin Streff


Archive | 2007

Information Security in Banking

Kevin Streff

Collaboration


Dive into the Kevin Streff's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sonell Raman

Dakota State University

View shared research outputs
Top Co-Authors

Avatar

Steve Graham

Dakota State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xinwen Fu

University of Massachusetts Lowell

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge