-
1
-
-
35548933551
-
Signal detection theory
-
Salkind, NJ, Ed, Thousand Oaks CA, Sage
-
Abdi, H. (2007). Signal detection theory. In: Salkind, NJ. (Ed.), Encyclopedia of Measurement and Statistics. Thousand Oaks (CA), Sage.
-
(2007)
Encyclopedia of Measurement and Statistics
-
-
Abdi, H.1
-
2
-
-
0004102787
-
-
Lawrence Erlbaum Associates, Inc
-
Anderson, J. R. Rules of the Mind. Lawrence Erlbaum Associates, Inc., 1993.
-
(1993)
Rules of the Mind
-
-
Anderson, J.R.1
-
3
-
-
84873948744
-
-
Retrieved Nov 9, 2006
-
Camtasia Studio. Retrieved Nov 9, 2006. http://www.tec.hsmith.com/ camtasia.asp.
-
Camtasia Studio
-
-
-
4
-
-
77953804362
-
-
Dhamija, R. and J. D. Tygar. 2005. The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06 - 08, 2005). SOUPS '05, 93. ACM Press, New York, NY, 77-88. DOI= http://doi.acm.org/10.1145/1073001. 1073009.
-
Dhamija, R. and J. D. Tygar. 2005. The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06 - 08, 2005). SOUPS '05, vol. 93. ACM Press, New York, NY, 77-88. DOI= http://doi.acm.org/10.1145/1073001. 1073009.
-
-
-
-
5
-
-
33745816410
-
-
Dhamija, R., J. D. Tygar. and M. Hearst. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 581-590. DOI= http://doi.acm.org/10.1145/1124772. 1124861.
-
Dhamija, R., J. D. Tygar. and M. Hearst. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 581-590. DOI= http://doi.acm.org/10.1145/1124772. 1124861.
-
-
-
-
6
-
-
0004134359
-
-
Washington, D.C, National Academy Press
-
Donovan, M. S., Bransford, J. D., & Pellegrino, J.W. 1999. How people learn: Bridging research and practice. Washington, D.C.: National Academy Press.
-
(1999)
How people learn: Bridging research and practice
-
-
Donovan, M.S.1
Bransford, J.D.2
Pellegrino, J.W.3
-
7
-
-
34250737359
-
-
Downs, J., M. Holbrook and L. Cranor. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/ 1143120.1143131.
-
Downs, J., M. Holbrook and L. Cranor. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, vol. 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/ 1143120.1143131.
-
-
-
-
8
-
-
35348858087
-
-
Retrieved March 7
-
eBay. Spoof Email Tutorial. Retrieved March 7, 2006, http://pages.ebay. com/education/spooftutorial/.
-
(2006)
Spoof Email Tutorial
-
-
eBay1
-
9
-
-
84890718531
-
-
is pointless. Retrieved, Jan 13, 2007
-
Evers, J. Security Expert: User education is pointless. Retrieved, Jan 13, 2007, http://news.com.com/2100-7350_3-6125213.html.
-
Security Expert: User education
-
-
Evers, J.1
-
10
-
-
35348888363
-
-
Federal Trade Commission, Retrieved Nov 7
-
Federal Trade Commission. An E-Card for You game. Retrieved Nov 7, 2006, http://www.ftc.gov/bcp/con.line/ecards/phishing/index.html.
-
(2006)
An E-Card for You game
-
-
-
11
-
-
84858496636
-
-
Federal Trade Commission, Retrieved Nov 7
-
Federal Trade Commission. How Not to Get Hooked by a Phishing Scam. Retrieved Nov 7, 2006, http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127. htm.
-
(2006)
How Not to Get Hooked by a Phishing Scam
-
-
-
12
-
-
35348822468
-
Fostering E-Mail Security Awareness: The West Point Carronade
-
Retrieved March 22, 2006
-
Ferguson, A. J. 2005. Fostering E-Mail Security Awareness: The West Point Carronade. EDUCASE Quarterly. 2005, 1. Retrieved March 22, 2006, http://www.educause.edu/ir/library/pdf/eqm0517.pdf.
-
(2005)
EDUCASE Quarterly
, vol.2005
, pp. 1
-
-
Ferguson, A.J.1
-
15
-
-
34250765199
-
TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks. Cryptology ePrint Archive
-
Report 2004/155
-
Herzberg, A., and Gbara, A. 2004. TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks. Cryptology ePrint Archive, Report 2004/155. http://epr.int.iacr.org/2004/155.
-
(2004)
-
-
Herzberg, A.1
Gbara, A.2
-
16
-
-
84871232045
-
Social Phishing
-
To appear in, Retrieved March 7, 2006
-
Jagatic, T.,N. Johnson, M. Jakobsson and F. Menczer. Social Phishing. To appear in Communications of the ACM. Retrieved March 7, 2006, http://www.indiana.edu/~phishing/social-network-experiment/phishing-preprint. pdf.
-
Communications of the ACM
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
17
-
-
84889292983
-
-
Jakobsson, M, and Myers, S, Eds, Wiley-Interscience
-
Jakobsson, M., and Myers, S., Eds. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley-Interscience, 2006.
-
(2006)
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
-
-
-
20
-
-
0004035835
-
-
The MIT Press Cambridge, Massachusetts The MIT Press, Cambridge, Massachusetts, London, England, February
-
Klein, G. Sources of power : How people make decisions? The MIT Press Cambridge, Massachusetts The MIT Press, Cambridge, Massachusetts, London, England, February 1999.
-
(1999)
Sources of power : How people make decisions
-
-
Klein, G.1
-
21
-
-
36849090201
-
Teaching Johnny not to fall for phish
-
Tech. rep, Carnegie Mellon University
-
Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L. F., and Hong, J. 2007. Teaching Johnny not to fall for phish. Tech. rep., Carnegie Mellon University. http://www.cylab.cmu.edu/files/cmucylab07003.pdf.
-
(2007)
-
-
Kumaraguru, P.1
Sheng, S.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
-
22
-
-
35348906237
-
Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System
-
CHI 2007
-
Kumaraguru, P., Y. Rhee, A. Acquisti, L. Cranor, J. Hong and E. Nunge. 2007. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. In Proceedings of the 2007 Computer Human Interaction, CHI 2007.
-
(2007)
Proceedings of the 2007 Computer Human Interaction
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.4
Hong, J.5
Nunge, E.6
-
23
-
-
36849076828
-
-
Macmillan, N.A., Creelman, C.D. 2005. Detection theory: user's guide (2nd edition).Mahwah (NJ): Erlbaum.
-
Macmillan, N.A., Creelman, C.D. 2005. Detection theory: user's guide (2nd edition).Mahwah (NJ): Erlbaum.
-
-
-
-
24
-
-
84858405596
-
We learn better together: Enhancing elearning with emotional characters
-
International Society of the Learning Sciences, pp
-
Maldonado, H., Lee, J.-E. R., Brave, S., Nass, C., Nakajima, H., Yamada, R., Iwamura, K., and Morishima, Y. 2005. We learn better together: enhancing elearning with emotional characters. In CSCL '05: Proceedings of the 2005 conference on Computer support for collaborative learning, International Society of the Learning Sciences, pp. 408-417.
-
(2005)
CSCL '05: Proceedings of the 2005 conference on Computer support for collaborative learning
, pp. 408-417
-
-
Maldonado, H.1
Lee, J.-E.R.2
Brave, S.3
Nass, C.4
Nakajima, H.5
Yamada, R.6
Iwamura, K.7
Morishima, Y.8
-
25
-
-
0003781450
-
-
New York Cambridge University Press
-
Mayer, R. E. Multimedia Learning. New York Cambridge University Press, 2001.
-
(2001)
Multimedia Learning
-
-
Mayer, R.E.1
-
28
-
-
0000606137
-
The case for social agency in computer-based teaching: Do students learn more deeply when they interact with animated pedagogical agents?
-
Moreno, R., Mayer, R. E., Spires, H. A., and Lester, J. C. 2001. The case for social agency in computer-based teaching: Do students learn more deeply when they interact with animated pedagogical agents? Cognition and Instruction 19, 2, 177 - 213.
-
(2001)
Cognition and Instruction
, vol.19
, Issue.2
, pp. 177-213
-
-
Moreno, R.1
Mayer, R.E.2
Spires, H.A.3
Lester, J.C.4
-
29
-
-
0009414946
-
-
IRL, Retrieved Oct 15, 2006
-
MySecureCyberspace. Uniform Resource Locator (IRL). Retrieved Oct 15, 2006. http://www.mysecurecyberspace.com/encyclopedia/index/uniform-resource- locator-url-.html.
-
Uniform Resource Locator
-
-
MySecureCyberspace1
-
30
-
-
36849090670
-
-
New York State Office of Cyber Security & Critical Infrastructure Coordination. Gone Phishing, A Briefing on the Anti-Phishing Exercise Initiative for New York State Government. Aggregate Exercise Results for public release
-
New York State Office of Cyber Security & Critical Infrastructure Coordination. Gone Phishing... A Briefing on the Anti-Phishing Exercise Initiative for New York State Government. Aggregate Exercise Results for public release.
-
-
-
-
32
-
-
84859220647
-
Playing a game: The ecology of designing, building and testing games as educational activities
-
Association for the Advancement of Computing in Education
-
Repenning, A., and Lewis, C. Playing a game: The ecology of designing, building and testing games as educational activities. In ED-Media, World Conference on Educational Multimedia, Hypermedia & Telecommunications (2005), Association for the Advancement of Computing in Education.
-
(2005)
ED-Media, World Conference on Educational Multimedia, Hypermedia & Telecommunications
-
-
Repenning, A.1
Lewis, C.2
-
33
-
-
0010057718
-
Semantic Attacks: The Third Wave of Network. Attacks
-
Retrieved Sep 2
-
Schneier, B. 2000. Semantic Attacks: The Third Wave of Network. Attacks. Crypto-Gram Newsletter. Retrieved Sep 2, 2006, http://www.schneier.com/ crypto-gram-0010.html#1.
-
(2000)
Crypto-Gram Newsletter
-
-
Schneier, B.1
-
34
-
-
36849051994
-
-
Wu, M. Fighting Phishing at the User Interface. 2006. MIT PhD. thesis. http://groups.csail.mit.edu/uid/projects/phishing/minwuthesis.pdf.
-
Wu, M. Fighting Phishing at the User Interface. 2006. MIT PhD. thesis. http://groups.csail.mit.edu/uid/projects/phishing/minwuthesis.pdf.
-
-
-
-
35
-
-
34250786200
-
-
Wu, M., Miller R. C. and Little, G. 2006. Web Wallet: Preventing Phishing Attacks By Revealing User Intentions. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/1143120.1143133.
-
Wu, M., Miller R. C. and Little, G. 2006. Web Wallet: Preventing Phishing Attacks By Revealing User Intentions. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, vol. 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/1143120.1143133.
-
-
-
-
36
-
-
33745867321
-
-
Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 601-610. DOI= http://doi.acm.org/10.1145/1124772.1124863
-
Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 601-610. DOI= http://doi.acm.org/10.1145/1124772.1124863
-
-
-
-
38
-
-
34250747969
-
-
Yee, K. P. and Sitaker K. 2006. PassPet: Convenient Password Management And Phishing Protection. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/ 1143120.1143126.
-
Yee, K. P. and Sitaker K. 2006. PassPet: Convenient Password Management And Phishing Protection. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, vol. 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/ 1143120.1143126.
-
-
-
-
39
-
-
84898190494
-
Phinding Phish: Evaluating Anti-Phishing Tools
-
San Diego, CA, 28 February -2 March
-
Zhang, Y., S. Egelman, L. Cranor, and J. Hong. 2007. Phinding Phish: Evaluating Anti-Phishing Tools. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007), San Diego, CA, 28 February -2 March, 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007)
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
-
40
-
-
35348905575
-
J. Hong., and L. Cranor, and 2007. CANTINA: A Content-Based Approach to Detecting Phishing Websites
-
Banff, Alberta, Canada, May 8-12
-
Zhang, Y., J. Hong., and L. Cranor, and 2007. CANTINA: a Content-Based Approach to Detecting Phishing Websites. In Proceedings of the 16th International World Wide Web Conference (WWW2007), Banff, Alberta, Canada, May 8-12, 2007
-
(2007)
Proceedings of the 16th International World Wide Web Conference
-
-
Zhang, Y.1
|