- Privacy, Security, and Data Protection
- Privacy-Preserving Technologies in Data
- Cybercrime and Law Enforcement Studies
- Technology Use by Older Adults
- Spam and Phishing Detection
- Terrorism, Counterterrorism, and Political Violence
- Biometric Identification and Security
- Impact of Technology on Adolescents
- Healthcare Education and Workforce Issues
- User Authentication and Security Systems
- Technology Adoption and User Behaviour
- Sharing Economy and Platforms
- Crime Patterns and Interventions
- Innovation in Digital Healthcare Systems
- Data Quality and Management
- Internet Traffic Analysis and Secure E-voting
- Cyberloafing and Workplace Behavior
- Technology and Data Analysis
- Access Control and Trust
- Misinformation and Its Impacts
- Information and Cyber Security
- Cloud Data Security Solutions
University at Buffalo, State University of New York
2008-2022
Cloud computing has fostered many concerns about security, privacy, and business integrity. How do information assurance practices differ based on a cloud vendor's service offering, amount of online traffic, company size?
Recent events have shown that online booking is vulnerable to hacking incidents such as data breaches. The primary purpose of this study investigate the effect risky decision-making factors on consumer post breach behavior. After a breach, most companies offer monitoring services restore customer trust and encourage them for future purchases. However, little research has been done understand impact these In study, we examine whether can mitigate risk perception booking. We utilized Marriott...
This research investigates the ability of older adults to perceive online threats. Specifically, factors that influence web-browsing safety efficacy (WSE) among are investigated. The investigated are: attitude towards unsolicited email senders, risk aversion, perceived in finding information, security education, and social connectivity. Partial least squares regression analysis was used analyze a sample age 55 years older. results showed information were positively associated with WSE...
The unprecedented terrorist attacks in India on November 26, 2008 tested conventional anti-terrorism response mechanisms of the law enforcement agencies. In this study we explore information processing that governed first from Mumbai Police department towards these attacks. This was conducted through interviews and survey with officers two distinct groups within department. One played a strategic role (Control Room) while other tactical (Zone 1) shaping early critical subduing Our findings...
Advanced Google search queries can be used to extract sensitive information from Websites that potentially exploited for malice. The purpose of this paper is identify the existence unintended private disclosure possibilities in educational institutions across four countries through advanced techniques such as Hacking. Hacking a technique retrieving may not intended public retrieval using operators. focus on country level comparison Excel files which contain information. For exploratory...