-
2
-
-
0030201356
-
Interpersonal deception theory
-
D. B. Buller and J. K. Burgoon. Interpersonal deception theory. Communication Theory, 6(3):203-242, 1996.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 203-242
-
-
Buller, D.B.1
Burgoon, J.K.2
-
3
-
-
3843149546
-
Deception in computer-mediated communication
-
J. R. Carlson, J. F. George, J. K. Burgoon, M. Adkins, and C. H. White. Deception in computer-mediated communication. Group Decision and Negotiation, 13(1):5-28, 2004.
-
(2004)
Group Decision and Negotiation
, vol.13
, Issue.1
, pp. 5-28
-
-
Carlson, J.R.1
George, J.F.2
Burgoon, J.K.3
Adkins, M.4
White, C.H.5
-
5
-
-
70350708035
-
-
E. Ellis, L. Worthington, and M. Larkin. Research synthesis on effective teaching principles and the design of quality tools for educators. Technical report, National center to improve the tools of educators, 1994.
-
E. Ellis, L. Worthington, and M. Larkin. Research synthesis on effective teaching principles and the design of quality tools for educators. Technical report, National center to improve the tools of educators, 1994.
-
-
-
-
6
-
-
35348822468
-
Fostering E-Mail Security Awareness: The West Point Carronade
-
A. J. Ferguson. Fostering E-Mail Security Awareness: The West Point Carronade. EDUCASE Quarterly, (1), 2005.
-
(2005)
EDUCASE Quarterly
, vol.1
-
-
Ferguson, A.J.1
-
7
-
-
34848911641
-
Social phishing
-
October
-
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 50(10):94-100, October 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
8
-
-
0035740371
-
Detecting deception: Adversarial problem solving in a low base-rate world
-
P. Johnson, S. Grazioli, K. Jamal, and G. Berryman. Detecting deception: adversarial problem solving in a low base-rate world. Cognitive Science: A Multidisciplinary Journal, 25(3):355-392, 2001.
-
(2001)
Cognitive Science: A Multidisciplinary Journal
, vol.25
, Issue.3
, pp. 355-392
-
-
Johnson, P.1
Grazioli, S.2
Jamal, K.3
Berryman, G.4
-
9
-
-
35348906237
-
Protecting people from phishing: The design and evaluation of an embedded training email system
-
P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge. Protecting people from phishing: the design and evaluation of an embedded training email system. In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 905-914, 2007.
-
(2007)
CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems
, pp. 905-914
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
Nunge, E.6
-
10
-
-
84983228550
-
Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer
-
Working Group
-
P. Kumaraguru, Y. Rhee, S. Sheng, S. Hasan, A. Acquisti, L. F. Cranor, and J. Hong. Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer. e-Crime Researchers Summit, Anti-Phishing Working Group, 2007.
-
(2007)
e-Crime Researchers Summit, Anti-Phishing
-
-
Kumaraguru, P.1
Rhee, Y.2
Sheng, S.3
Hasan, S.4
Acquisti, A.5
Cranor, L.F.6
Hong, J.7
-
11
-
-
70350726627
-
-
P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong. Under review
-
P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong. Under review.
-
-
-
-
12
-
-
67249151917
-
Lessons from a real world evaluation of anti-phishing training
-
Working Group, October
-
P. Kumaraguru, S. Sheng, A. Acquisti, L. F. Cranor, and J. Hong. Lessons from a real world evaluation of anti-phishing training. e-Crime Researchers Summit, Anti-Phishing Working Group, October 2008.
-
(2008)
e-Crime Researchers Summit, Anti-Phishing
-
-
Kumaraguru, P.1
Sheng, S.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
-
14
-
-
70350714695
-
Fighting Phishing at the User Interface
-
August, and, Eds, Security and Usability: Designing Secure Systems that People Can Use
-
R. C. Miller and M. Wu. Fighting Phishing at the User Interface. O'Reilly, August 2005. In Lorrie Cranor and Simson Garfinkel (Eds.) Security and Usability: Designing Secure Systems that People Can Use.
-
(2005)
O'Reilly
-
-
Miller, R.C.1
Wu, M.2
-
17
-
-
70350743379
-
-
New York State Office of Cyber Security & Critical Infrastructure Coordination. Gone phishing. . . a briefing on the anti-phishing exercise initiative for new york state government. Aggregate Exercise Results for public release., 2005.
-
New York State Office of Cyber Security & Critical Infrastructure Coordination. Gone phishing. . . a briefing on the anti-phishing exercise initiative for new york state government. Aggregate Exercise Results for public release., 2005.
-
-
-
-
18
-
-
84965393809
-
New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training
-
July
-
R. A. Schmidt and R. A. Bjork. New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training. Psychological Science, 3(4):207-217, July 1992.
-
(1992)
Psychological Science
, vol.3
, Issue.4
, pp. 207-217
-
-
Schmidt, R.A.1
Bjork, R.A.2
-
19
-
-
36849073159
-
Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish
-
S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge. Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish. In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security, pages 88-99, 2007.
-
(2007)
SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
20
-
-
84869648148
-
-
employees. News article, January
-
E. Spagat. Justice department hoaxes employees. News article, January 2009. http://news.yahoo.com/s/ap/20090129/ ap-on-go-ca-st-pe/justice-hoax.
-
(2009)
Justice department hoaxes
-
-
Spagat, E.1
-
21
-
-
3843130753
-
Where did they go wrong? an analysis of the failure of knowledgeable internet consumers to detect deception over the internet
-
March
-
G. Stefano. Where did they go wrong? an analysis of the failure of knowledgeable internet consumers to detect deception over the internet. Group Decision and Negotiation, 13:149-172, March 2004.
-
(2004)
Group Decision and Negotiation
, vol.13
, pp. 149-172
-
-
Stefano, G.1
|