Cyber Ways Podcast artwork

Cyber Ways Podcast

26 episodes - English - Latest episode: about 2 months ago - ★★★★★ - 2 ratings

The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Craig Van Slyke, are both widely published information systems academics who keep one foot in the world of practice.The Cyber Ways Podcast is brought to you by the Center for Information Assurance at the Louisiana Tech University's College of Business. The Cyber Ways podcast is funded through a Just Business grant, made possible through the generosity of donors to the Louisiana Tech University College of Business.

Technology News Tech News cyber security cybersecurity information technology information privacy user behavior
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Fortifying Financial Data: Decoding Cybersecurity With Jake Lee

January 28, 2024 15:00 - 35 minutes - 24.2 MB

Discover the forces shaping your financial data's safety as we sit down with the eminent Jake Lee Jaeung, the Clifford Ray King Endowed Professor of Information Systems. In a landscape where cybercriminals lurk at every digital corner, we dissect how a blend of routine activity theory and practical cybersecurity can alter the terrain to our advantage. Together, we plunge into Jake's rigorous study with 461 financial institution employees and unravel the factors that skew risk perception and ...

Dewald Roode Workshop with Dr. Karen Renaud

September 19, 2023 10:00 - 46 minutes - 31.8 MB

Are you ready to shift your perspective on cybersecurity? We've got Dr. Karen Renaud, the general chair of Dewald Roode Workshop (DRW) this year and a renowned figure in information security research, to guide us on this fascinating journey. We'll be dissecting the paradigm-shifting presentations, lively debates and thought-provoking discussions from the workshop, with a special focus on Basie von Solms' revolutionary thoughts on the future of cybersecurity. Looking to understand why people...

Voices of Privacy with France Bélanger and Donna Wertalik

July 31, 2023 12:00 - 46 minutes - 32.2 MB

Ever thought about the digital footprints you leave while surfing the web? What about those convenient log-ins via multiple accounts - ever wondered about the risks involved? This week, we're thrilled to talk with Professors France Belanger and Donna Wertalik of Virginia Tech University's Pamplin College of Business to help us unravel these intriguing questions. They're here to discuss their groundbreaking initiative, Voices of Privacy (https://www.voicesofprivacy.com/), aimed at raising awa...

HackGPT - Generative AI and Security with Dr. Karen Renaud and Dr. Merrill Warkentin

May 15, 2023 09:00 - 32 minutes - 22.5 MB

ChatGPT burst into public awareness only a few months ago. The popularity of ChatGPT and similar generative AI tools offer great promise, but also represent significant threats to cybersecurity. In this episode of Cyber Ways, Tom and Craig have a fascinating discussion with Dr. Karen Renaud of the University of Strathclyde and Dr. Merrill Warkentin of Mississippi State University about their recent article in MIT Sloan Management Review, which they co-authored with George Westerman of MIT's ...

Fear and Phishing with Dr. Deanna House

April 18, 2023 09:00 - 33 minutes - 23.2 MB

Phishing attempts remain an important attack vector, despite efforts to mitigate their effectiveness. In this episode of Cyber Ways, Tom and Craig talk with Dr. Deanna House of the University of Nebraska - Omaha about her paper that examines the relationship between fear messaging and the success of phishing attempts. Dr. House gives some actionable advice to security professionals who want to help their users avoid falling victim to phishing attempts. Intro audio for the Cyber Ways Podcast...

Humans as the solution to information security with Dr. Karen Renaud

March 22, 2023 08:00 - 42 minutes - 29.6 MB

Security professionals often treat users as a major problem with securing information assets. But what if we could view humans as the SOLUTIONS?  Users aren't the enemy of security professionals and they shouldn't be treated as such. Our guest, Dr. Karen Renaud of Strathclyde University in Glasgow, Scotland, joins us to talk about the importance of treating users as allies, not the enemy, building a culture of security that focuses on successes, encourages learning, and builds resilience. M...

Why users don't care about security

February 09, 2023 10:00 - 40 minutes - 27.6 MB

Security is everyone's job. This is a common feeling among cyber security professionals, but users may feel differently. In this episode of Cyber Ways, Tom and Craig talk about why this may be so, and what security professionals can do about it. Citation: Van Slyke, C., & Belanger, F. (2020). Explaining the interactions of humans and artifacts in insider security behaviors: The mangle of practice perspective. Computers & Security, 99, 102064. For a copy of the paper, email vanslyke@latech....

Anatomy of an Exploit - A Very Special Interview

October 05, 2022 08:00 - 21 minutes - 14.8 MB

Sometimes, as cybersecurity professionals, it's easy to forget what an attack is like for a user. In this episode, Tom interviews his Mother about a recent attack. Mom tells an interesting cautionary tale of falling for a convincing phishing attack. Tom and I offer thoughts on how security professionals can help users avoid such exploits. Cyber Ways is brought to you by the Center for Information Assurance, which is housed in the College of Business at Louisiana Tech University. The podcast...

Cybersecurity Regulation and Maturity with Dr. Jeffrey Proudfoot

August 18, 2022 08:00 - 54 minutes - 37.5 MB

In this episode of Cyber Ways, Dr. Jeffrey Proudfoot of Bentley University joins Tom and Craig to discuss his research on how cybersecurity regulations affect cybersecurity maturity. Dr. Proudfoot is collaborating with Dr. Stuart Madnick of MIT's Sloan School of Business on this program of research. Dr. Proudfoot is an associate professor on information and process management in Bentley’s business school and is also a research affiliate at MIT’s "Cybersecurity at MIT Sloan" research group....

Combating Sex Trafficking with Laurie Giddens and Stacie Petter

July 14, 2022 08:00 - 43 minutes - 29.8 MB

Human trafficking is a huge, growing global problem. Sex trafficking is the most pervasive form of human trafficking. In this episode, we discuss how the Deliver Fund uses information technology to help law enforcement track the traffickers through their P.A.T.H. system. Drs. Giddens and Petter also discuss their research into factors that affect law enforcement officers' use of P.A.T.H. Dr. Laurie Giddens is an assistant professor in the department of Technology and Decision Sciences at No...

Insiders' Adaptations to Security Demands with Clay Posey and Tom Roberts

June 16, 2022 08:00 - 37 minutes - 26.1 MB

Protecting organizational information systems and information assets is a complex undertaking for both security professionals and end-users. In this episode of Cyber Ways, we discuss behavioral complexity as it relates to end-users' security behaviors with Dr. Clay Posey of Brigham Young University and Dr. Tom Roberts of the University of Texas at Tyler. We talk with Drs. Posey and Roberts about their 2017 paper, Insiders' Adaptations to Security-Based Demands in the Workplace: An Examinatio...

Controlling Insider Computer Abuse with A.J. Burns and Bryan Fuller

May 05, 2022 12:00 - 44 minutes - 30.7 MB

Organizational insiders represent the biggest threat to information security. Because of this, controlling insider computer abuse remains an important cyber security priority. In this episode of Cyber Ways, Dr, A.J Burns of Louisiana State University, and Dr. Bryan Fuller of Louisiana Tech University discuss their research into the tensions between insider's motivations to commit computer abuse, and organization's attempts to control such behavior. Intro audio for the Cyber Ways Podcast O...

Surveilling Teleworkers with Grant Clary

March 24, 2022 08:00 - 28 minutes - 20 MB

The COVID-19 pandemic forced many people, and organizations, into telework, which led to the question of how to properly monitor teleworkers. In this episode of Cyber Ways, we talk with Grant Clary about his research into teleworker surveillance and how different modes of surveillance affect teleworker well-being. Intro audio for the Cyber Ways Podcast Outro audio for Cyber Ways Podcast Cyber Ways is brought to you by the Center for Information Assurance, which is housed in the College o...

Security Fatigue with Dr. John D'Arcy

February 17, 2022 09:00 - 36 minutes - 25.2 MB

When it comes to security controls and communications, more may be less. More complex security requirements, increased security communication, and complex security policies may actually lead to less secure end-user behaviors. Why? Security fatigue -- users simply feel worn out by having to deal with information security. In this episode of Cyber Ways, Dr. John D’Arcy of the University of Delaware joins us to discuss his research (conducted with Alec Cram of the University of Waterloo, and Je...

Neutralization Theory - How Users Rationalize Policy Violations

January 20, 2022 09:00 - 30 minutes - 20.8 MB

In this episode of Cyber Ways, Tom and Craig discuss a classic behavioral security paper that explores how users rationalize their purposeful violations of security policy. Listen and learn the six common rationalizations and what security managers can do to reduce their effects. Citation: Siponen, M., & Vance, A. (2010). Neutralization: new insights into the problem of employee information systems security policy violations,  MIS Quarterly, 34(3), 487-502. Intro audio for the Cyber Ways ...

Habituation to Security Warnings with Dr. Anthony Vance

January 05, 2022 09:00 - 31 minutes - 21.9 MB

Every day we are bombarded with security warnings that all look more-or-less the same. Over time, we tend to tune out these warnings through a process called habituation. In this episode of Cyber Ways, we discuss this problem and how to address it with Dr. Anthony (Tony) Vance of Virginia Tech. Dr. Vance and his colleagues have conducted fascinating research using sophisticated technologies including functional magnetic resonance imaging (fMRI) and eye tracking to gain an understanding of ...

Holiday Hiatus until 6 January 2022

December 07, 2021 06:00 - 1 minute - 1.32 MB

Tom and I are taking a short break from releasing new episodes. But don't worry, we'll be back with a new episode the week of January 2, 2022. Have a great holiday season and stay secure! Intro audio for the Cyber Ways Podcast Outro audio for Cyber Ways Podcast

Holiday Hiatus

December 07, 2021 06:00 - 1 minute - 1.32 MB

Tom and I are taking a short break from releasing new episodes. But don't worry, we'll be back with a new episode the week of January 2, 2022. Have a great holiday season and stay secure! Intro audio for the Cyber Ways Podcast Outro audio for Cyber Ways Podcast

Fear Appeals with Dr. Dennis Galletta

November 30, 2021 09:00 - 27 minutes - 19.2 MB

We humans, like all animals, are wired to respond to fear.  When a wildebeest senses a lion's presence, they go on alert and flee. Humans react similarly -- fear brings reaction. In this episode of Cyber Ways, we talk with Dr. Dennis Galletta from the Katz School of Business at the University of Pittsburg about his research into how to leverage users' fear to bring about protective behaviors, such as using antimalware software or backing up data.  Boss, S. R., Galletta, D. F., Lowry, P. B.,...

Security on Autopilot with Dr. Alan Dennis

November 11, 2021 12:00 - 28 minutes - 19.9 MB

Many studies of cyber security behavior treat behaviors as the result of conscious thought. But, most behaviors are automatic and occur without any conscious deliberation of the benefits and risks of the behavior. Psychologists call this automatic thinking System 1 cognition as opposed to the more deliberative System 2 cognition. Unfortunately, System 1 thinking has rarely been studied in the context of security behaviors. In this episode of Cyber Ways, we talk with Dr. Alan Dennis about his...

Phishing's Long Tail with Drs. Clay Posey and Matt Canham

October 28, 2021 08:00 - 39 minutes - 26.9 MB

In this episode of Cyber Ways, Dr. Clay Posey of Brigham Young University, and Dr. Matthew Canham from the University of Central Florida join us to discuss their 2021 paper, “Phishing for Long Tails: Examining Organizational Repeat Clickers and Protective Stewards,” which was published in SAGE Open. The paper discusses an extensive research project that investigated user responses to phishing attempts. Their results indicate that the majority of phishing attempts clicks come from a minority ...

Multi-Layered Protection with Drs. Robert E. Crossler and France Belanger

October 14, 2021 08:00 - 31 minutes - 22 MB

The Cyber Ways podcast is brought to you by the Center for Information Assurance, at Louisiana Tech University’s College of Business. Cyber Ways is funded through a Just Business grant, made possible through the generosity of donors to the Louisiana Tech University College of Business. For more information contact Craig Van Slyke at [email protected] Intro audio for the Cyber Ways Podcast Outro audio for Cyber Ways Podcast Cyber Ways is brought to you by the Center for Information Assu...

Cyber Complacency with Dr. Tom Stafford

September 30, 2021 08:00 - 32 minutes - 22.2 MB

In this episode of Cyber Ways, Craig interviews co-host Dr. Tom Stafford about his 2021 paper, Platform-Dependent Computer Security Complacency: The Unrecognized Insider Threat, which was published in the IEEE Transactions on Engineering Management. Dr. Stafford is the J.E. Barnes Eminent Scholar in Data Analytics at Louisiana Tech University. He holds doctorates in Marketing from the University of Georgia, and Management Information Systems from the University of Texas at Arlington. In add...

Cybersecurity and the herd with Dr. Merrill Warkinten

September 15, 2021 06:00 - 34 minutes - 23.7 MB

Whether we know it or not, our behaviors, including those related to cybersecurity, are influenced by others. Sometimes this is obvious, such as when we read reviews before reserving a hotel room, but often the effects are more subtle. In this episode of Cyber Ways, Dr. Merrill Warkentin of Mississippi State University joins us to discuss his 2020 paper, "Can Secure Behaviors be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions, which was published...

Cybersecurity and the herd with Dr. Merrill Warkentin

September 15, 2021 06:00 - 34 minutes - 23.7 MB

Whether we know it or not, our behaviors, including those related to cybersecurity, are influenced by others. Sometimes this is obvious, such as when we read reviews before reserving a hotel room, but often the effects are more subtle. In this episode of Cyber Ways, Dr. Merrill Warkentin of Mississippi State University joins us to discuss his 2020 paper, "Can Secure Behaviors be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions, which was published...

Cyber Ways Podcast Trailer

September 06, 2021 10:00 - 6 minutes - 4.44 MB

The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance. Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and C...