


default search action
Wm. Arthur Conklin
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Keith Harrison, Greg White, Wm. Arthur Conklin:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2024: 1880 - 2023
- [c30]Keith Harrison, Wm. Arthur Conklin, Greg White:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2023: 1673 - 2022
- [j4]Stuart Baxley, Nicholas Bastin, Deniz Gurkan
, William Arthur Conklin:
Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN. Int. J. Crit. Infrastructure Prot. 39: 100573 (2022) - [c29]Gregory B. White, Keith Harrison, Wm. Arthur Conklin:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2022: 1 - 2021
- [c28]Gregory White, Wm. Arthur Conklin, Keith Harrison:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2021: 1 - 2020
- [c27]Wm. Arthur Conklin:
The Role of Consequences in Securing Cyber-Physical Systems. HICSS 2020: 1-8 - [c26]Gregory White, Keith Harrison, Wm. Arthur Conklin:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2020: 1-2
2010 – 2019
- 2019
- [c25]Wm. Arthur Conklin, Gregory White, Keith Harrison:
Introduction to the Minitrack on Cybersecurity in Digital Government. HICSS 2019: 1 - 2018
- [j3]Art Conklin, Chris Bronk:
Enhancing a SCRM Curriculum With Cybersecurity. Int. J. Syst. Softw. Secur. Prot. 9(2): 46-56 (2018) - [c24]Wm. Arthur Conklin, Matt Bishop:
Contrasting the CSEC 2017 and the CAE Designation Requirements. HICSS 2018: 1-7 - [c23]Gregory White, Wm. Arthur Conklin, Keith Harrison:
Introduction to the Minitrack on Cybersecurity and Government. HICSS 2018: 1 - 2017
- [c22]Gregory White, Wm. Arthur Conklin, Keith Harrison:
Introduction to Cybersecurity and Government Minitrack. HICSS 2017: 1 - 2016
- [c21]Wm. Arthur Conklin, Rayford B. Vaughn, Gregory B. White:
Introduction to the Cybersecurity Minitrack. HICSS 2016: 2615 - [c20]Wm. Arthur Conklin:
IT vs. OT Security: A Time to Consider a Change in CIA to Include Resilienc. HICSS 2016: 2642-2647 - 2015
- [c19]Gregory B. White, Wm. Arthur Conklin, Rayford B. Vaughn:
Introduction to the E-government Secure Cyberspace in 21st Century Government Minitrack. HICSS 2015: 2252 - [c18]Wm. Arthur Conklin:
State Based Network Isolation for Critical Infrastructure Systems Security. HICSS 2015: 2280-2287 - 2014
- [c17]Wm. Arthur Conklin, Gregory B. White, Rayford B. Vaughn:
Introduction to Infrastructure Security Minitrack. HICSS 2014: 1986 - [c16]Wm. Arthur Conklin, Raymond E. Cline, Tiffany Roosa:
Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors. HICSS 2014: 2006-2014 - 2013
- [c15]Rayford B. Vaughn Jr., Wm. Arthur Conklin, Gregory B. White:
Introduction to E-Government Infrastructure Security Minitrack. HICSS 2013: 1753 - 2012
- [c14]Wm. Arthur Conklin, Glenn B. Dietrich:
What the Graduate Needs to Know about Operational Information Security. AMCIS 2012 - 2011
- [j2]William Arthur Conklin:
Control systems personnel are from Mars; IT personnel are from Venus. Int. J. Crit. Infrastructure Prot. 4(2): 76-77 (2011) - [c13]Wm. Arthur Conklin:
Software Assurance: The Need for Definitions. HICSS 2011: 1-7 - 2010
- [c12]Diana K. Young, Wm. Arthur Conklin, Glenn B. Dietrich:
Re-examining the Information Systems Security Problem from a Systems Theory Perspective. AMCIS 2010: 375 - [c11]Wm. Arthur Conklin, Glenn B. Dietrich:
Emergency Communications Using the Web: Matching Media Richness to the Situation. HICSS 2010: 1-9
2000 – 2009
- 2009
- [c10]William Arthur Conklin:
Information Security Foundations for Electronic Medical Records. AMCIS 2009: 407 - 2008
- [c9]Wm. Arthur Conklin:
Information Sharing and Emergency Services: An Examination Using Information Security Principles. AMCIS 2008: 12 - [c8]Wm. Arthur Conklin, Glenn B. Dietrich:
Systems Theory Model for Information Security. HICSS 2008: 265 - 2007
- [c7]Wm. Arthur Conklin:
Barriers to Adoption of e-Government. HICSS 2007: 98 - [c6]Wm. Arthur Conklin, Glenn B. Dietrich:
Secure Software Engineering: A New Paradigm. HICSS 2007: 272 - 2006
- [c5]Art Conklin:
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course. HICSS 2006 - [c4]Art Conklin, Gregory B. White:
e-Government and Cyber Security: The Role of Cyber Security Exercises. HICSS 2006 - 2005
- [c3]Art Conklin, Glenn B. Dietrich:
Secure Software Design Principles: A Systems Approach. AMCIS 2005: 274 - [c2]Art Conklin, Glenn B. Dietrich:
Modeling End User Behavior to Secure a PC in a Unmanaged Environment. AMCIS 2005: 449 - 2004
- [j1]Gregory B. White, Art Conklin:
The Appropriate Use of Force-on-Force Cyberexercises. IEEE Secur. Priv. 2(4): 33-37 (2004) - [c1]Art Conklin, Glenn B. Dietrich, Diane B. Walz:
Password-Based Authentication: A System Perspective. HICSS 2004
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint