scispace - formally typeset
K

Keith S. Jones

Researcher at Texas Tech University

Publications -  102
Citations -  1746

Keith S. Jones is an academic researcher from Texas Tech University. The author has contributed to research in topics: Phishing & The Internet. The author has an hindex of 13, co-authored 100 publications receiving 1552 citations. Previous affiliations of Keith S. Jones include Kansas State University & University of Cincinnati.

Papers
More filters
Journal ArticleDOI

A Report on a Novice User's Interaction with the Internet through a Self-Voicing Application:

TL;DR: The results suggest that there may be problems in interfacing the user with the software and the way textual information is aurally displayed to the user.
Journal ArticleDOI

Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report:

TL;DR: A brief interview technique was developed that allowed the importance of knowledge, skills, and abilities related to offensive and defensive cyber work to be measured and produces information that is directly applicable to the development of cybersecurity curricula.
Proceedings ArticleDOI

Sonifying Internet Security Threats

TL;DR: This late-breaking-work paper hypothesizes that the use of proper sounds in conjunction with visual cues can better represent security alerts to all users.
Proceedings ArticleDOI

Teaching Cyber Security through Competition An Experience Report about a Participatory Training Workshop

TL;DR: The results indicate that competitionbased training can be very effective in stimulating students’ motivation to learn, however, extra caution should be taken into account when delivering these types of training workshops.
Journal ArticleDOI

Comparing mouse and steady-state visual evoked response-based control

TL;DR: A novel EEG-based control was tested, which monitors the Steady-State Visual Evoked Response (SSVER) and, in contrast to the mouse, SSVER-based acquisition times were insensitive to variations in target distance, which might serve as an operational advantage in certain applications.