Skip to content

MEJonathan K. Adams Doctoral Candidate, Cybersecurity, Marymount University

Prior Affiliations: Nova Southeastern University; UNC Charlotte

My research interests are centered on usable security. I am interested in usability and user factors that impact cybersecurity and can be utilized to optimize and improve security tools and policies. 

Academic Background
Doctor of Science in Cybersecurity, Marymount University (2023) – GPA 4.00/4.00
– Dissertation Title: “The Effect of Security Awareness Training, Leadership Commitment, and Usable Security on Security Compliance Intent”, 11/17/2023
Master's of Science in Computer Science, Howard University (2002) – GPA 3.62/4.00
– Capstone Project: “A Distributed Peer-to-Peer Web Search Engine using JXTA”, Dec 2002

Graduate Certificate in Cybersecurity Engineering, SANS Institute
– Capstone Project WiFiCue: Public Wireless Access Security Assessment Tool” | Source Code (GitHub)
Bachelor's of Science in Computer Information Science, Benedict College (2001)

Past Teaching Experience
Adjunct Assoc. Prof., Northern Virginia Community College, IET/Cyber
– ITP270 – Programming for Cybersecurity
– ITN260 – Network Security Basics
– CSC110 – Principles of Computing
Adjunct Faculty, George Mason University, ISOM Department
– MIS320 – Networks and Information Security

Adjunct Asst. Prof., University of Maryland University College
Graduate Assistant, UNC Charlotte, Computer Science Department

Refereed Conference Publications
Adams, J. K. & Liu, M. (2022, August). Impact of User Experience and Comprehension on Security Awareness Training. In Proceedings of the 2022 Americas Conference on Information Systems (AMCIS 2022). Top 25% paper – [Full Text]
Adams, J. K. (2006, April). A service-centric approach to a parameterized RBAC service. In Proceedings of the 5th International conference on Applied computer science (pp. 1050-1055). – [Full Text]

Refereed Journal Publications
Adams, J. K & Bristow, B. N. (2006, June). Access Control for Hierarchical Joint-Tenancy. WSEAS Transactions on Computing, 5(6). [Full Text]