Calvin NMN Nobles

Calvin NMN Nobles
Verified
Calvin verified their affiliation via an institutional email.
Verified
Calvin verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Portfolio Vice President and Dean at University of Maryland Global Campus

About

73
Publications
41,247
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
602
Citations
Current institution
University of Maryland Global Campus
Current position
  • Portfolio Vice President and Dean

Publications

Publications (73)
Conference Paper
Full-text available
Burnout poses a critical challenge in cybersecurity, affecting both individual well-being and organizational effectiveness. Despite its importance, limited scholarly research exists on preventive strategies specific to cybersecurity, hindering the development of evidence-based approaches. Current literature predominantly examines the causes, constr...
Conference Paper
Full-text available
This paper examines the integration of human factors engineering into Explainable Artificial Intelligence (XAI) to develop AI systems that are both human-centered and technically robust. The increasing use of AI technologies in high-stakes domains, such as healthcare, finance, and emergency response, underscores the urgent need for explainability,...
Article
Full-text available
Burnout poses a critical challenge in cybersecurity, affecting both individual well-being and organizational effectiveness. Despite its importance, limited scholarly research exists on preventive strategies specific to cybersecurity, hindering the development of evidence-based approaches. Current literature predominantly examines the causes, constr...
Article
Full-text available
This paper examines the integration of human factors engineering into Explainable Artificial Intelligence (XAI) to develop AI systems that are both human-centered and technically robust. The increasing use of AI technologies in high-stakes domains, such as healthcare, finance, and emergency response, underscores the urgent need for explainability,...
Chapter
Full-text available
Human Factors Engineering as a Service (HFEaaS) provides a human-centered framework for enhancing cybersecurity by addressing cognitive, psychological, and behavioral interactions with security systems. By prioritizing usability and cognitive alignment, HFEaaS reduces complexity, minimizes human error, and strengthens resilience against cyber threa...
Preprint
Full-text available
This paper addresses the critical issue of burnout among cybersecurity professionals, a growing concern that threatens the effectiveness of digital defense systems. As the industry faces a significant attrition crisis, with nearly 46% of cybersecurity leaders contemplating departure from their roles, it is imperative to explore the causes and conse...
Article
Full-text available
Three human factors experts get to the bottom of what the human factors discipline actually is, how the cybersecurity community and organizations can benefit from it, and how to create a pipeline of professionals with human factors and cybersecurity expertise.
Article
Full-text available
Human factors remain the most critical vulnerability in cybersecurity, with many breaches involving human errors or social engineering. Integrating human factors engineering (HFE) into cybersecurity strategies is crucial for addressing these vulnerabilities and enhancing security resilience. Despite its importance, HFE is not widely recognized as a...
Conference Paper
Full-text available
The World Health Organization recognizes burnout as an occupation-related syndrome, posing potential cybersecurity risks due to increased error rates that can have consequential financial and reputational impacts on organizations. Globally, cybersecurity professionals contend with mental health concerns that can precipitate burnout. Notably, human...
Article
Full-text available
This scholarly investigation addresses a critical gap in the cybersecurity domain, particularly the ambiguous conceptualization of ‘human factors’ within this field. Prompted by a discourse on LinkedIn, the study underscores the necessity for a standardized definition, which emerged as a pivotal concern among practitioners and academics. The increa...
Chapter
AI is impacting consent and transparency adversely. Although AI can potentially augment transparency in decision-making via advanced technology, it is creating new concerns. This chapter focuses on the impact of AI systems on individuals' ability to provide informed consent for using their data, and the relationship between transparency in AI decis...
Chapter
The increasing demand for cybersecurity professionals in the tech sector has created a talent shortage unlike ever before. While initiatives such as hiring inclusiveness, broader outreach, and apprenticeship programs have been implemented to bring additional talent to the field, it has remained largely homogeneous. Historically Black Colleges and U...
Chapter
Full-text available
It is necessary to reassess the allocation of resources, questioning traditional notions of return on investment (ROI) and focusing, in particular on the critical area of cybersecurity. Anticipated damages from cybercrime are increasing 15% per year globally, totaling an estimated $10.5 trillion by 2025. In addition to the financial benefits, the R...
Article
Full-text available
This position paper delves into the complex interplay between proactive cyber defense mechanisms and inherent human susceptibilities. The researchers posit that as cyber systems advance in technical robustness, malicious entities progressively exploit human psychological tendencies and behavioral inconsistencies to circumvent security measures. The...
Article
Full-text available
Data shows that 12% of leaders are rated as ‘very effective’ at leadership. This research emphasizes the importance of understanding human behavior and its impact on leadership effectiveness, innovative work behavior (IWB), and the ability to respond to complex cyber threats, particularly in the realm of cybersecurity leadership. Emotional intellig...
Chapter
Full-text available
The COVID-19 pandemic has presented healthcare institutions with unprecedented challenges in maintaining robust cybersecurity practices to safeguard patient data and protect critical healthcare operations. This chapter explores the ethical, organizational cultural, and leadership complexities hospitals face in cybersecurity during and after the pan...
Chapter
Full-text available
In the rapidly advancing landscape of biotechnology, laboratories, and healthcare research, the criticality of robust cybersecurity risk management techniques cannot be overstated. As these industries increasingly rely on interconnected technologies and digitized data for innovation and patient care, they become attractive targets for malicious cyb...
Chapter
Agent-based modeling (ABM) serves as a powerful and innovative tool to evaluate and address cybersecurity risks in the auto industry. With the increasing integration of advanced technologies in modern vehicles, the potential vulnerabilities and threats to cybersecurity have become a major concern. ABM allows cybersecurity experts to simulate comple...
Chapter
Full-text available
The increasing prevalence of cybercrime poses significant challenges to small businesses, which often lack the resources and expertise to effectively manage their cybersecurity risk. This chapter investigates the potential of cybersecurity communities of practice (CoPs) as a viable solution to support small businesses in addressing these challenges...
Chapter
Full-text available
Due to its simple installation and connectivity, the internet of things (IoT) is susceptible to malware attacks. As IoT devices have become more prevalent, they have become the most tempting targets for malware. In this chapter, the authors propose a novel detection and analysis method that harnesses the power and simplicity of decision trees. The...
Conference Paper
Full-text available
With human errors and behavior being significant contributors to data breaches and cyber-attacks, it is critical to integrate human factors principles into cybersecurity education. The lack of emphasis on human factors in cybersecurity curricula has resulted in a significant gap in understanding and addressing the role of human behavior in cybersec...
Conference Paper
Full-text available
Hacking back or retaliating against cyber attackers through offensive means is a controversial and complex issue that has garnered significant attention recently. This paper provides a valuable resource for understanding the complexities and implications of hacking back in the context of cybersecurity. This paper provides a scoping review of the ex...
Chapter
Full-text available
Offensive artificial intelligence's (AI) growing role in cybersecurity raises concerns about ethics, defense, and human implications. AI is integrated into national capabilities, fueling algorithmic warfare while enabling AI's malicious use by cybercriminals and state hackers. Offensive AI intensifies cyberattacks, leading to unpredictable and stea...
Chapter
Full-text available
Offensive cybersecurity is a complex and rapidly evolving field critical for protecting organizations and governments from cyber threats. However, due to its sensitive nature and potential ethical concerns, it is often shrouded in secrecy and controversy. This chapter comprehensively explains offensive cybersecurity, including its definition, capab...
Chapter
Full-text available
By 2025, up to 85 million jobs globally could be displaced due to automation and new technologies. The traditional approach of relying solely on human resources to address unemployment is no longer effective. A concern is the narrow-minded focus aligning internal organizational objectives with human resource practices. As technology rapidly advance...
Chapter
Full-text available
Interference in the election process from both abroad and within the United States has produced chaos and confusion in business markets, communities, and among voters. Elections have become less reliable as a result of misleading statements. Election deniers are actively working to undermine confidence in our elections and suppress turnout, particu...
Chapter
Full-text available
This study examines the nature of professionals being insider threats to their own organization, as well as the general increase in harder-to-detect threats coming from an ever-widening acceptance of third-party insiders by organizations that rely on them, such as those in the fields of biomedical sciences, synthetic biology, artificial intelligenc...
Chapter
Full-text available
In 2022, there were more than 4,100 data breaches that were brought to public attention, which resulted in nearly 22 billion people's information being compromised. When compared to 2021, when the number of cybersecurity specialists stood at 2.72 million, this shows a significant rise in the severity of the problem. Many businesses run the danger o...
Chapter
Full-text available
As a result of COVID-19, the leaders' needs to be adaptable and innovative with their approaches has never been more significant. These adaptive management and risk strategy approaches should also consider the importance of planning around cybersecurity. As a result of COVID-19, more commercial transactions are now conducted electronically; neverth...
Chapter
Full-text available
For a variety of reasons, cybercriminals view healthcare organizations as desirable targets to attack. With significant shortages of employees and managers in cybersecurity and technology management, the need for more professionals in the field have never been more important and necessary. Meeting these workforce development shortfalls and developi...
Chapter
Full-text available
Attacks in the U.S. on Asian American professionals during COVID-19, the #MeToo anti-sexual harassment movement, and the Black Lives Matter protests have led more U.S. cybersecurity organizations to realize the importance of diversity and inclusion training and leadership coaching for their managers. This analysis applies an action research and act...
Chapter
Full-text available
As the world becomes more interconnected, business competition becomes increasingly fierce, making it critical for companies to stay ahead of the curve in the current era of globalization. With a forecasted turnover of 50-75% higher than in previous years and a timeline 18% longer to fill roles than pre-pandemic, employee retention has become essen...
Chapter
Full-text available
Researchers forecast that autonomous vehicles will reduce accidents by 90%. The ethical interplay of autonomous vehicles, cybersecurity vulnerabilities, and societal demands further complicates the governments' decisions on self-driving cars. Autonomous vehicles have safety, economic, and societal benefactors; however, offsetting the unintended con...
Chapter
Full-text available
While cybercrime continues to challenge governments, businesses, and people, cybercriminals are harvesting massive payoffs by engaging in malicious operations. A significant impediment to countering cybercrime is the lack of a standardized definition of cybercrime that transcends international boundaries and hegemonic societies. The extensive taxin...
Article
Full-text available
Commonly referenced as corporate citizenship or sustainability, the initial idea of corporate social responsibility (CSR) matured from the 1987 seminal Brundtland Report, which the United Nations is credited for spearheading. The steady progression of CSR highlights the need for organizations to coordinate the fulfillment of legal, philanthropic, m...
Article
Full-text available
The United Nations forecasts that by 2050, the world's population will reach 9.8 billion and 11.2 billion in 2100. An ever-growing global population threatens food security, accompanied by an increasing food shortage and relentless cybersecurity attacks. Agriculture 4.0, smart farming, and precision farming are essential to provide the technologica...
Article
Full-text available
Stress, burnout, and security fatigue continue as slight destroyers of strong cybersecurity and significant human factors concerns. The persistence of these human performance issues is concerning given the lack of mitigation and integration of human factors practitioners to mitigate these adverse risk circumstances. Security fatigue is not a new ph...
Chapter
Full-text available
According to the US Federal Bureau of Investigations (FBI) the number of complaints about cyberattacks to their cyber division is up to as many as 4,000 a day. Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cybersecurity-related roles. Colleges and universities h...
Article
Full-text available
As organizations raced to leverage cloud computing to capitalize on its economic and flexible computing capacity, misconfiguration errors ascended to unprecedented levels. One security expert noted observing over 230 million misconfigurations daily. Cloud misconfiguration errors are problematic as malicious actors continually pursue missteps to gai...
Chapter
Full-text available
A Florida-based obstetrics and gynecology facility reported in February 2019 that they lost data because of a ransomware attack. In November 2017, 107,000 healthcare records were exposed from data breaches, and 340,000 records were exposed in December 2017. In 2019, 23,000 patient records at Critical Care, Pulmonary & Sleep Associates were compromi...
Article
Full-text available
Commercial aviation is vital to the economic health of the global economy. Commercial aviation as a global entity should be an international critical infrastructure that constantly safeguards and protects from malicious threats, including cybersecurity threat actors (Nobles, 2019). The international aviation industry needs a comprehensive cybersecu...
Chapter
The growth and development of cybersecurity jobs and careers have created a need for new skilled faculty that can effectively teach the appropriate content to students at all levels. Often instructors are hired based on their academic credentials and professional experience without the use of assessment and faculty development methods to discover i...
Article
Full-text available
The emergence of COVID-19 in the U.S. forced organizations to make unprecedented changes at a record pace to include a sharp uptick in the number of employees working remotely. The researchers aimed to explore what factors influenced positive remote working experiences. Data collection consisted of capturing the lived experiences of remote working...
Article
Full-text available
Duvall Systems is a government information technology, and cybersecurity consulting firm focused on providing high-tech consulting support for U.S. federal government agencies. Duvall has experienced a series of discrimination complaints from Asian-American employees related to workplace mistreatment. These complaints relate to a hostile work envir...
Article
Full-text available
Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry & Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor healt...
Article
Full-text available
The U.S. hospital Ransomware attacks during COVID-19 have highlighted the importance of cybersecurity workers and expertise in healthcare. These attacks are increasing when the US is experiencing a considerable cybersecurity workforce shortage. As everyone becomes increasingly hyper-connected and cybercrime intensifies in both scale and complexity,...
Article
Full-text available
Women represent 50% of workers in the United States but only 28% of the employees at 51 of the top U.S. engineering and technology organizations. Engineering and technology firms have experienced significant challenges in creating more women-friendly cultures. According to Women Who Tech’s most recent survey, 75% of female employees have experience...
Article
Full-text available
In 2019 the global cost of cyber-crime was over 2 trillion dollars. Current research literature outlines that 80-90% of security breaches are due to human-enabled errors in the U.S. and the U.K. Organizations encounter a barrage of cybersecurity threats that prey on the propensity of human error, human inaction, human behavior, and human misbehavio...
Article
Full-text available
This article explores the nature of cybersecurity professionals being insider threats to their own organization, as well as the general increase in harder-to-detect threats coming from an ever-widening acceptance of third-party insiders, which organizations, biotechnology engineering, and other healthcare organizations rely on. After examining the...
Article
Full-text available
Sexual harassment remains prevalent in the workplace as well as a significant financial burden for organizations. Given the cost associated with sexual harassment, reputational damage, and internal disturbances, sexual harassment is a mounting apprehension because senior managers are responsible for bestowing an organizational culture that is intol...
Article
Full-text available
A Florida-based obstetrics and gynecology facility reported in February 2019 that they lost data because of a ransomware attack. In November 2017, 107,000 healthcare records were exposed from data breaches, and 340,000 records were exposed in December 2017. In 2019, 23,000 patient records at Critical Care, Pulmonary & Sleep Associates were compromi...
Article
Full-text available
Most business organizations lack a human factors program and remain inattentive to human-centric issues and human-related problems that are leading to cybersecurity incidents, significant financial losses, reputational damage, and lost production. Other industries such as aviation, nuclear power, healthcare, and industrial safety leverage human fac...
Conference Paper
Full-text available
Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cybersecurity-related roles. Colleges and universities have created certificates, undergraduate and graduate programs to train professionals in these job roles. The challenge of meeting the cybersecurity workforce sh...
Article
Full-text available
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own on-line...
Chapter
Full-text available
Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity operations are suffering due to the cybersecurity talent gap accompanied by the increasing sophistication and num...
Article
Full-text available
The growth and development of cybersecurity jobs and careers have created a need for new skilled faculty that can effectively teach the appropriate content to students at all levels. Often instructors are hired based on their academic credentials and professional experience without the use of assessment and faculty development methods to discover i...
Article
Full-text available
The U.S. financial sector is the bedrock of the economic health and strategic advancement. As a critical infrastructure, the financial sector continuously faces cyber-attacks and other nefarious activity. The financial sector is undergoing a technological explosion and forcing banks and financial institutions to implement cutting edge technologies....
Chapter
Full-text available
Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and pu...
Article
Full-text available
Human factors remained unexplored and underappreciated in information security. The mounting cyber-attacks, data breaches, and ransomware attacks are a result of human-enabled errors, in fact, 95% of all cyber incidents are human-enabled. Research indicates that existing information security plans do not account for human factors in risk management...
Article
Full-text available
The business of food production has undergone significant revolutions through the innovations of the Industrial Revolution, a division of labor, genetically modified crops, the growth of sustainability, and use of farming robots, computers, and drones. An invasive business, economic, and public policy phenomenon that is driving technology integrati...
Chapter
Full-text available
Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and pu...
Article
Full-text available
Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity operations are suffering due to the cybersecurity talent gap accompanied by the increasing sophistication and num...
Chapter
Full-text available
Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and pu...

Network

Cited By