top of page

Recent Works

Untitled-23.png

Cognitive Security: An Architecture Informed Approach from Cognitive Science

Gareth Doherty

Untitled-4.png

The UnCODE system: A neurocentric systems approach for classifying the goals and methods of Cognitive Warfare

 

Torvald F. Ask, Ricardo Lugo, Stefan Sütterlin, Matthew Canham, Daniel Hermansen, and Benjamin J. Knox

Cognitive flexibility but not cognitive styles influence deepfake detection skills and metacognitive accuracy

 

Torvald F. Ask, Ricardo Lugo, Jonas fritsch, Karl Veng, Jonathan Eck, Muhammed-Talha Özmen, Basil Bärreiter, Benjamin J. Knox, and Stefan Sütterlin

Untitled-3.png
Untitled-11.png

Neurophysiological and emotional influences on team communication and metacognitive cyber situational awareness during a cyber engineering exercise

 

Torvald F. Ask, Benjamin J. Knox, Ricardo G. Lugo, Ivar Helgetun, & Stefan Sütterlin

Planting a Poison SEAD: Using Social Engineering Active Defense to Counter Cybercriminals

 

Matthew Canham and Juliet Tuthill

Untitled-7.png
Untitled-10.png

The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition Skills

 

Stefan Sütterlin, Ric Lugo, Torvald F. Ask

Phish Derby: Shoring the Human Shield Through Gamified Phishing Attacks

 

Matthew Canham, Clay Posey, Michael Constantino

Untitled-8.png
Untitled-6.png

On the Relationship between Health Sectors’
Digitalization and Sustainable Health Goals:
A Cyber Security Perspective

 

Stefan Sütterlin, Benjamin J. Knox, Kaie Maennel, Matthew Canham and
Ricardo G. Lugo

Ambiguous Self-Induced Disinformation (ASID) Attacks:
Weaponizing a Cognitive Deficiency

 

Matthew Canham, Stefan Sütterlin, Torvald Fossåen Ask, Benjamin James Knox, Lauren Glenister, Ricardo Gregorio Lugo

Untitled-9.png
Untitled-1.png

Stefan Sütterlin, Torvald F. Ask, Sophia Mägerle, Sandra Glöckler, Leandra Wolf, Julian Schray, Alaya Chandi, Teodora Bursac, Ali Khodabakhsh, Benjamin J. Knox, Matthew Canham, Ricardo Lugo

Phishing for Long Tails: Examining Organizational Repeat Clickers and Protective Stewards

 

Matthew Canham, Clay Posey, Delainey Strickland, Michael Constantino

Untitled-14.png
Untitled-13.png

Deepfake Social Engineering: Creating a Framework for Synthetic
Media Social Engineering

 

Dr. Matthew Canham

HUMAN FACTORS AND ERGONOMICS IN DESIGN
OF A3: AUTOMATION, AUTONOMY, AND
ARTIFICIAL INTELLIGENCE

 

Ben D. Sawyer, Dave B. Miller, Matthew Canham, and Waldemar Karwowski

Untitled-12.png
Untitled-16.png

Confronting Information Security's Elephant, The Unintentional Insider Threat

 

Matthew Canham, Clay Posey, and Patricia S. Bockelman

Neurosecurity: Human Brain Electro-Optical Signals as MASINT

Matthew Canham, Ben D Sawyer

Untitled-18.png
Untitled-15.png

Understanding Online Information Operations:
Development of an Influence Network for Scientific
Inquiry Testing Environment (INSITE)

 

Courtney Crooks, Tom McNeil, Ben Sawyer, Matthew Canham, David Muchlinski

The Enduring Mystery of the Repeat Clickers

Matthew Canham et al

Untitled-17.png
Untitled-19.png

Developing Training Research to Improve Cyber Defense of Industrial Control Systems

Matthew Canham, Stephen M Fiore, Bruce D Caulkins

Socio-technical communication: The hybrid space and the OLB model for science-based cyber education

 

Benjamin J. Knox, Øyvind Jøsok, Kirsi Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo G. Lugo, Stefan Sütterlin

Untitled-5.png
Untitled-20.png

A Computational Social Science Approach to Examine the Duality between Productivity and Cybersecurity Policy Compliance within Organizations

Clay Posey and Matthew Canham

Macrocognition Applied to the Hybrid Space: Team Environment, Functions and Processes in Cyber Operations

Øyvind Jøsok, Benjamin J. Knox, Kirsi Helkala, Kyle Wilson, Stefan Sütterlin, Ricardo G. Lugo & Terje Ødegaard

Untitled-21.png
Untitled-22.png

Exploring the Hybrid Space

Øyvind Jøsok, Benjamin J. Knox, Kirsi Helkala, Ricardo G. Lugo, Stefan Sütterlin & Paul Ward

bottom of page