Gregory Bott

Orcid: 0000-0003-0928-9990

According to our database1, Gregory Bott authored at least 17 papers between 2015 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Hidden in Plain Sight: Detecting Illicit Massage Businesses from Mobility Data.
CoRR, February, 2026

Linking Multisite Sex Ad Data at the Individual Level to Aid Counter-Trafficking Efforts.
Manuf. Serv. Oper. Manag., 2026

Human-factor vulnerabilities of automation in SOCs: A mixed-methods multigroup analysis.
Comput. Secur., 2026

Understanding surveillance stress in cybersecurity professionals: A stage model perspective.
Comput. Secur., 2026

2025
Linking Multi-Site Sex Ad Data at the Individual Level to Aid Counter-Trafficking Efforts.
CoRR, July, 2025

Language Models for Adult Service Website Text Analysis.
CoRR, July, 2025

The influence of affective processing on phishing susceptibility.
Eur. J. Inf. Syst., May, 2025

Artificial intelligence misuse and concern for information privacy: New construct validation and future directions.
Inf. Syst. J., January, 2025

2024
Ethics in Netnography: Exploring Privacy in Public Spaces.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2022
Collaborating with Local and Federal Law Enforcement for Disrupting Sex Trafficking Networks.
INFORMS J. Appl. Anal., 2022

To Disclose or Not to Disclose: An Evaluation of the Effects of Information Control and Social Network Transparency.
Comput. Secur., 2022

2020
Analyzing IOT users' mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment.
Comput. Secur., 2020

2018
Sensemaking and Success in the Transition from Community Colleges to University IS/CS/CE Programs.
Commun. Assoc. Inf. Syst., 2018

An Examination of Risk Perceptions and Protected Health Information Disclosure Intentions: A Construal Level Theory Perspective.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Investigating Privacy Concerns of Internet of Things (IoT) Users.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory.
J. Manag. Inf. Syst., 2017

2015
IP Bouncer: An End-User Network Privacy Enhancing Tool.
Proceedings of the 21st Americas Conference on Information Systems, 2015


  Loading...