top of page
Research & PhD Education
Search
Obi Ogbanufe, PhD
Sep 5, 20231 min read
Cybercrime Research: Towards a Conceptual Typology of Darknet Risks
Cybercriminals seek to avoid risks, including detection, arrests, sanctions, and violence. So, they use several strategies to avoid...
9 views0 comments
Obi Ogbanufe, PhD
Mar 29, 20231 min read
Comparing fingerprint-based biometrics authentication versus traditional authentication methods
Using an experiment, we compared between fingerprint-based biometrics authentication vers using traditional means like credit card to...
47 views0 comments
Obi Ogbanufe, PhD
Oct 15, 20221 min read
Securing Online Accounts and Assets: Examining Personal Investments and Protection Motivation
Do your investments (e.g., time, effort, friendships) in your online accounts (e.g., Facebook, Instagram, Tiktok, Bank, YouTube, Netflix)...
24 views0 comments
Obi Ogbanufe, PhD
Aug 4, 20221 min read
Study: Personal cloud storage use
Dear Participant, The University of North Texas Department of Information Technology and Decision Sciences is seeking participants who...
77 views0 comments
Obi Ogbanufe, PhD
Mar 18, 20212 min read
Informing cybersecurity strategic commitment through top management
Cyberinsurance, top executives, cyber-risk, risk management, cybersecurity strategy, breaches Published: Information & Management...
24 views0 comments
Obi Ogbanufe, PhD
Mar 18, 20211 min read
Exploring stewardship: A precursor to voluntary security behaviors
Cybersecurity Stewardship - Less mandatory, more voluntary. Less punishment, more commitment. Authors: Obi Ogbanufe, Robert Crossler,...
26 views0 comments
Obi Ogbanufe, PhD
Mar 18, 20212 min read
Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity
Could employees see themselves as or identify as cybersecurity end-users? What are the benefits, and how does it work? Published:...
43 views
Obi Ogbanufe, PhD
Mar 18, 20212 min read
Going Through the Emotions of Regret and Fear: Identity Theft Protection Motivation
We explore why and how individuals accept or reject recommended steps to respond to the threat of identity theft. Published:...
14 views
bottom of page