Barbara Endicott-Popovsky

Barbara Endicott-Popovsky
Associate Professor

Email: endicott@uw.edu

Education

  • Ph.D. 2007, University of Idaho
  • M.S. 1987, Seattle Pacific University
  • M.B.A. 1985, University of Washington
  • B.A. 1967, University of Pittsburgh

Research Interests

Computer science education; Computer crime; Information systems education; Model curricula; Security and privacy; Information science education; Quality assurance; Documentation; Local area networks; Networks; Operating systems security; Software and ITS engineering; Software evolution; Web applications; Web services.

Recent Publications

  • David, S., & Endicott-Popovsky, B. (2019, July). Augmented Cognition for Socio-Technical Systems. In International Conference on Human-Computer Interaction (pp. 133-142). Springer, Cham.
  • Endicott-Popovsky, B. (2018, July). Applications of Distributed Socio-technical Synthetic Intelligent (SI) Systems Using Hybrid “Compensating Controls” Architectures. In International Conference on Learning and Collaboration Technologies (pp. 276-285). Springer, Cham.
  • Zantua, M. A., Popovsky, V., Endicott-Popovsky, B., & Holt, F. B. (2018, July). Discovering a Profile for Protect and Defend: Penetration Testing. In International Conference on Learning and Collaboration Technologies (pp. 530-540). Springer, Cham.
  • David, S. L., & Endicott-Popovsky, B. (2017, July). Security Beyond Secrecy. In International Conference on Learning and Collaboration Technologies (pp. 305-323). Springer, Cham.
  • Chung, S., Moon, S., & Endicott-Popovsky, B. (2016, September). Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System. In Proceedings of the 5th Annual Conference on Research in Information Technology (pp. 13-18). ACM.
  • Dupuis, M. J., Crossler, R. E., & Endicott-Popovsky, B. (2016, January). Measuring the human factor in information security and privacy. In 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 3676-3685). IEEE.
  • Endicott-Popovsky, B., David, S., & Crosby, M. E. (2015, August). Setting a Privacy and Security Comfort Zone in the Internet of Things. In International Conference on Augmented Cognition (pp. 722-734). Springer, Cham.

Courses

  • Spring 2019
    • ICS 425 Computer Security and Ethics
    • ICS 426 Computer System Security
  • Fall 2019
    • ICS 426 Computer System Security
    • ICS 428 Digital Forensics