-
1
-
-
0000796225
-
Cognitive tutors: Lessons learned
-
Anderson, J. R., A. T. Corbett, K. Koedinger and R. Pelletier. 1995. Cognitive tutors: Lessons learned. The Journal of Learning Sciences, 4, pp. 167-207.
-
(1995)
The Journal of Learning Sciences
, vol.4
, pp. 167-207
-
-
Anderson, J.R.1
Corbett, A.T.2
Koedinger, K.3
Pelletier, R.4
-
2
-
-
0002004285
-
-
Anderson, J. R., M. R. Lynne and Herbert A. Simon. 1996. Situated Learning and Education. Educational Researcher. Vo. 25, No.4, pp. 5-11.
-
Anderson, J. R., M. R. Lynne and Herbert A. Simon. 1996. Situated Learning and Education. Educational Researcher. Vo. 25, No.4, pp. 5-11.
-
-
-
-
3
-
-
34548344520
-
-
Anti-Phishing Working Group
-
Anti-Phishing Working Group. Phishing Activity Trends Report. 2006. http://www.antiphishing.org/reports/apwg_report_jan_2006.pdf.
-
(2006)
Phishing Activity Trends Report
-
-
-
4
-
-
35348816136
-
-
Anti-Phishing Working group, http://www.antiphishing.org/. Retrieved on Sept 20, 2006.
-
Anti-Phishing Working group, http://www.antiphishing.org/. Retrieved on Sept 20, 2006.
-
-
-
-
5
-
-
0032165140
-
Integrating textual and pictorial information via pop-up windows: An experimental study
-
11
-
Betrancourt, M. and A. Bisseret. 1998. Integrating textual and pictorial information via pop-up windows: an experimental study. Behaviour and Information Technology. Volume 17, Number 5, pp. 263-273(11).
-
(1998)
Behaviour and Information Technology
, vol.17
, Issue.5
, pp. 263-273
-
-
Betrancourt, M.1
Bisseret, A.2
-
7
-
-
33745816410
-
-
Dhamija, R., Tygar, J. D., and Hearst, M. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 581-590. DOI= http://doi.acm.org/10.1145/1124772. 1124861.
-
Dhamija, R., Tygar, J. D., and Hearst, M. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 581-590. DOI= http://doi.acm.org/10.1145/1124772. 1124861.
-
-
-
-
8
-
-
77953804362
-
-
Dhamija, R. and Tygar, J. D. 2005. The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06-08, 2005). SOUPS '05, 93. ACM Press, New York, NY, 77-88. DOI= http://doi.acm.org/10.1145/1073001.1073009.
-
Dhamija, R. and Tygar, J. D. 2005. The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06-08, 2005). SOUPS '05, vol. 93. ACM Press, New York, NY, 77-88. DOI= http://doi.acm.org/10.1145/1073001.1073009.
-
-
-
-
10
-
-
34250737359
-
-
Downs, J. S., Holbrook, M. B., and Cranor, L. F. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12-14, 2006). SOUPS '06, 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/1143120.1143131.
-
Downs, J. S., Holbrook, M. B., and Cranor, L. F. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12-14, 2006). SOUPS '06, vol. 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/1143120.1143131.
-
-
-
-
11
-
-
35348858087
-
-
Retrieved December 30
-
eBay. Spoof Email Tutorial. Retrieved December 30, 2006. http://pages.ebay.com/education/spooftutorial/
-
(2006)
Spoof Email Tutorial
-
-
eBay1
-
12
-
-
35348908949
-
-
eBay Toolbar. Retrieved December 30, 2006. http://pages.ebay.com/ ebay_toolbar/
-
eBay Toolbar. Retrieved December 30, 2006. http://pages.ebay.com/ ebay_toolbar/
-
-
-
-
13
-
-
33745943068
-
Using pop-up windows to improve multimedia learning
-
Erhel, S. and E. Jamet. 2006. Using pop-up windows to improve multimedia learning. Journal of Computer Assisted Learning, Volume 22, Number 2. pp. 137-147.
-
(2006)
Journal of Computer Assisted Learning
, vol.22
, Issue.2
, pp. 137-147
-
-
Erhel, S.1
Jamet, E.2
-
14
-
-
35348888363
-
-
Federal Trade Commission, Retrieved December 30
-
Federal Trade Commission. An E-Card for You game. Retrieved December 30, 2006. http://www.ftc.gov/bcp/conline/ecards/phishing/index.html.
-
(2006)
An E-Card for You game
-
-
-
15
-
-
35348908309
-
-
Federal Trade Commission, Retrieved December 30
-
Federal Trade Commission. Phishing Alerts. Retrieved December 30, 2006. http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm
-
(2006)
Phishing Alerts
-
-
-
16
-
-
35348822468
-
Fostering E-Mail Security Awareness: The West Point Carronade
-
Ferguson, A. J. 2005. Fostering E-Mail Security Awareness: The West Point Carronade. EDUCASE Quarterly. http://www.educause.edu/ir/library/pdf/ eqm0517.pdf.
-
(2005)
EDUCASE Quarterly
-
-
Ferguson, A.J.1
-
17
-
-
35348841507
-
-
Fette, I., N. Sadeh and A. Tomasic. Learning to Detect Phishing Emails. June 2006. ISRI Technical report, CMU-ISRI-06-112. http://reports-archive.adm. cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf.
-
Fette, I., N. Sadeh and A. Tomasic. Learning to Detect Phishing Emails. June 2006. ISRI Technical report, CMU-ISRI-06-112. http://reports-archive.adm. cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf.
-
-
-
-
18
-
-
34147138124
-
Social Phishing
-
To appear in the, Retrieved March 7
-
Jagatic, T.,N. Johnson, M. Jakobsson and F. Menczer. Social Phishing. To appear in the Communications of the ACM. Retrieved March 7, 2006, http://www.indiana.edu/~phishing/social-network-experiment/phishing-preprint. pdf.
-
(2006)
Communications of the ACM
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
19
-
-
34249852316
-
-
Jakobsson, M. and Ratkiewicz, J. 2006. Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In Proceedings of the 15th international Conference on World Wide Web (Edinburgh, Scotland, May 23-26, 2006). WWW '06. ACM Press, New York, NY, 513-522. DOI= http://doi.acm.org/10.1145/1135777.1135853
-
Jakobsson, M. and Ratkiewicz, J. 2006. Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In Proceedings of the 15th international Conference on World Wide Web (Edinburgh, Scotland, May 23-26, 2006). WWW '06. ACM Press, New York, NY, 513-522. DOI= http://doi.acm.org/10.1145/1135777.1135853
-
-
-
-
21
-
-
35348839581
-
Trust modeling for online transactions: A phishing scenario
-
Oct 30, Nov 1, Ontario, Canada
-
Kumaraguru, P., A. Acquisti and L. Cranor. 2006. Trust modeling for online transactions: A phishing scenario. Proceedings of Privacy Security Trust, Oct 30 - Nov 1, 2006, Ontario, Canada
-
(2006)
Proceedings of Privacy Security Trust
-
-
Kumaraguru, P.1
Acquisti, A.2
Cranor, L.3
-
23
-
-
35348886089
-
-
Retrieved Sept 20
-
Mail Frontier. Phishing IQ. http://survey.mailfrontier.com/survey/ quiztest.html.Retrieved Sept 20, 2006
-
(2006)
Phishing IQ
-
-
Frontier, M.1
-
24
-
-
0003781450
-
-
New York Cambridge University Press
-
Mayer, R.E. Multimedia Learning. 2001. New York Cambridge University Press.
-
(2001)
Multimedia Learning
-
-
Mayer, R.E.1
-
25
-
-
33845297553
-
Animations Need Narrations: An Experimental Test of a Dual Coding Hypothesis
-
Mayer, R.E. and R B. Anderson. 1991 Animations Need Narrations: An Experimental Test of a Dual Coding Hypothesis. Journal of Educational Psychology. Volume 83, Number 4. pp. 484-490.
-
(1991)
Journal of Educational Psychology
, vol.83
, Issue.4
, pp. 484-490
-
-
Mayer, R.E.1
Anderson, R.B.2
-
28
-
-
35348866139
-
-
Retrieved September 10, 2006
-
Netcraft. Retrieved September 10, 2006. http://news.netcraft.com/
-
Netcraft
-
-
-
29
-
-
35348826688
-
Gone Phishing
-
New York State Office of Cyber Security & Critical Infrastructure Coordination, Aggregate Exercise Results for public release
-
New York State Office of Cyber Security & Critical Infrastructure Coordination. 2005. Gone Phishing... A Briefing on the Anti-Phishing Exercise Initiative for New York State Government. Aggregate Exercise Results for public release.
-
(2005)
A Briefing on the Anti-Phishing Exercise Initiative for New York State Government
-
-
-
30
-
-
35348905509
-
-
Richmond, R. Hackers set up attacks on home PCs, financial firms: study. Retrieved September 25, 2006. http://www.marketwatch.com/News/Story/Story.aspx? dist=newsfinder&siteid=google&guid=%7B92615073-95B6-452E-A3B9- 569BEACF91E8%7D&keyword=
-
Richmond, R. Hackers set up attacks on home PCs, financial firms: study. Retrieved September 25, 2006. http://www.marketwatch.com/News/Story/Story.aspx? dist=newsfinder&siteid=google&guid=%7B92615073-95B6-452E-A3B9- 569BEACF91E8%7D&keyword=
-
-
-
-
31
-
-
33748964605
-
Don't be a phish: Steps in user education. ITICSE '06
-
New York, NY, USA
-
Robila, S. A., J. James and W. Ragucci. 2006. Don't be a phish: steps in user education. ITICSE '06: Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education. pp 237-241. New York, NY, USA.
-
(2006)
Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education
, pp. 237-241
-
-
Robila, S.A.1
James, J.2
Ragucci, W.3
-
32
-
-
35348847124
-
-
Schmeck, R. R, Ed, New York: Plenum Press
-
Schmeck, R. R. (Ed) 1988. Learning styles and strategies. New York: Plenum Press.
-
(1988)
Learning styles and strategies
-
-
-
34
-
-
35348835979
-
-
September 10
-
SpamAssasin. Retrieved September 10, 2006. http://spamassassin.apache. org/
-
(2006)
-
-
-
35
-
-
35348836583
-
-
September 10
-
SpoofGuard. Retrieved September 10, 2006, http://crypto.stanford.edu/ SpoofGuard/
-
(2006)
-
-
-
36
-
-
35348816749
-
-
September 10
-
SpoofStick. Retrieved September 10, 2006. http://www.spoofstick.com/
-
(2006)
-
-
-
37
-
-
35348861828
-
-
September 10
-
SquirrelMail. Retrieved September 10, 2006. http://www.squirrelmail.org/
-
(2006)
-
-
-
38
-
-
33745867321
-
-
Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 601-610. DOI= http://doi.acm.org/10.1145/1124772.1124863.
-
Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 601-610. DOI= http://doi.acm.org/10.1145/1124772.1124863.
-
-
-
-
39
-
-
85084161317
-
-
Ye, Z. and Sean S. Trusted Paths for Browsers. 2002. Proceedings of the 11th USENIX Security Symposium. pp. 263-279. USENIX Association. Berkeley, CA, USA.
-
Ye, Z. and Sean S. Trusted Paths for Browsers. 2002. Proceedings of the 11th USENIX Security Symposium. pp. 263-279. USENIX Association. Berkeley, CA, USA.
-
-
-
-
40
-
-
84898190494
-
Phinding Phish: Evaluating Anti-Phishing Tools
-
San Diego, CA, 28 February -2 March
-
Zhang, Y., S. Egelman, L. Cranor, and J. Hong. 2007. Phinding Phish: Evaluating Anti-Phishing Tools. In. Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007), San Diego, CA, 28 February -2 March, 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007)
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
|