Browse Category

Publications

Papers I have written.

Tracking Technostress: A Task Interruption of Data Entry Study

Coauthored with Dr. Randall Minas, University of Hawaii at Manoa and Presented at Human Computer Interaction International 2020

As of writing this, I have yet to conduct the experiment due to COVID-19. I intended to conduct it right after Spring Break, but we never returned. Now I am in the midst of my Dissertation, so will need to balance that and finishing this. Hopefully I can finish this soon. I enjoyed coming up with the experiment and hope it has some lasting impacts for understanding technostress individuals and how interruptions can impact performance.


Abstract. The prevalence of information systems and the resulting increase in continuous notifications have blurred the lines of work and leisure, resulting in increased stress. These changes in the work environment have had detrimental effects on workers ability to sustain attention and remain productive. Despite academic interest in both IT-mediated interruptions and technostress, there has been little research on the juncture of both of these while also utilizing eye tracking. We propose an experimental design on a sampling of undergraduate students in order to study the relationship of IT-mediated interruptions on task performance and the moderating effect of technostress on this relationship. In addition to we will utilize eyetracking (pupillary dilation and gaze duration) to tie the level of
IT-mediated interruptions to cognitive resources in low and high technostress individuals.

Research Model

Link to Paper
Link to Official Site
Link to Presentation (sorry for recording the wrong portion of the screen)

Password Requirement Analysis of 100 Major Internet Sites

This paper is quite a bit old, but was mine and another Cadet’s Senior paper.  I feel like it was pretty adequate, but failed to take the next leap, which was actually come up with suggested standards depending upon information sensitivity.  Interesting enough with the addition of Risk Management Framework in the Department of Defense, Information sensitivity level is one of the key steps to identifying what precautions are necessary.  I still get a kick out of reading the data we gathered at the time, especially like American Express in 2008 required the password to be no more than 8 character, but no less than 6.  It needed one letter and one number, but no spaces or special characters.  It could not be your User ID and it was NOT case sensitive.

Abstract

Many sites have different requirements for the complexity of the password required to login. There is no prescribed industry standard, just site specific recommendations for passwords. This causes specific sites to have inherently weaker passwords than their similar counter-parts. We have created a comparative analysis of one hundred major on-line websites in thirteen sectors that illustrate the disconnect between information sensitivity stored on the site and the minimum password strength used to protect it. Through this comparative analysis, we have created a web application allowing the user to input a password and be able to identify its strength and compare it to the password requirements in the analysis.

Link to Paper

Link to Data

Enterprise Use of Security Information and event Management Software

Abstract

This paper will analyze and justify the utilization of a security information and event management (SIEM) software. SIEM software is software that provides real-time monitoring of events, correlation of audit logs and notification of incidents to appropriate personnel. Large enterprises would benefit greatly from procuring SIEM software as it saves resources while researching potential incidents due to the correlation assembled by the SIEM. Conducting all the actions required to respond to an incident or actively monitor possible intrusions would require several full time employees in large organizations. This can be easily accomplished with the right SIEM software. By procuring a SIEM software, although expensive, it is a worthwhile investment in the defense of an enterprise network and fully justifiable if all duties were done manually. In addition, it meets regulatory compliance requirements such as Sarbanes-Oxley, Risk Management Framework or Health Information Accountability and Portability Act. It also assists in the identification and post-incident event management to implement lessons learned.

Link to Paper

Analysis of Bitcoin Improvement Proposals for Block Size Increase

I wrote this paper for my Systems Architecture course and decided to do it on a hotly debated topic for bitcoin; whether to increase the block size and if so, what way.  I submitted this paper to the Ledger, Bitcoin’s first peer reviewed journal, but since this topic is changing so quickly they passed for this iteration and requested a redo once the dust settles.

Abstract.  This paper will discuss the issues, hurdles and concerns regarding the maximum one megabyte block size limit currently imposed for Bitcoin and whether an increase to the block size is needed or required. This paper will also analyze both arguments for and against the block size and compare that to each of the current Bitcoin Improvement Proposals (BIP).  It is the conclusion of this paper that the block size should increase as long as the arguments against an increase are addressed and the best BIP(s) that supports this conclusion is an amalgamation of BIP 102 and BIP 103.

Link to Paper

Tweet by @JGarzik – https://twitter.com/jgarzik/status/697603575875309570