-
1
-
-
15344341499
-
Educational game models: Conceptualization and evaluation
-
A. Amory and R. Seagram, "Educational Game Models: Conceptualization and Evaluation", South African Journal of Higher Education, vol. 17 (2), pp. 206-217, 2003.
-
(2003)
South African Journal of Higher Education
, vol.17
, Issue.2
, pp. 206-217
-
-
Amory, A.1
Seagram, R.2
-
2
-
-
0010057718
-
Semantic attacks, the third wave of network attacks
-
October 2000, Retrieved from. (Accessed date: 02 April 2011.)
-
B. Schneier, "Semantic Attacks, The Third Wave of Network Attacks", Crypto-Gram Newsletter, October 2000, Retrieved from http://www.schneier.com/crypto-gram-0010.html. (Accessed date: 02 April 2011.)
-
Crypto-Gram Newsletter
-
-
Schneier, B.1
-
3
-
-
80053545071
-
A socio-behavioral study of home computer users' intention to practice security
-
Bangkok, Thailand
-
B. Y. Ng and M. A. Rahim, "A Socio-Behavioral Study of Home Computer Users' Intention to Practice Security", The Ninth Pacific Asia Conference on Information Systems, Bangkok, Thailand, 2005.
-
(2005)
The Ninth Pacific Asia Conference on Information Systems
-
-
Ng, B.Y.1
Rahim, M.A.2
-
4
-
-
80052601126
-
-
February 2006, Retrieved from. (Accessed example, date: 03 April 2011.)
-
C. E. Drake, J. J. Oliver and E. J. Koontz, "Mail Frontier Anatomy of a Phishing Email", February 2006, Retrieved from http://www. mailfrontier.com/docs/MF-Phish-Anatomy.pdf.(Accessed example, date: 03 April 2011.)
-
Mail Frontier Anatomy of A Phishing Email
-
-
Drake, C.E.1
Oliver, J.J.2
Koontz, E.J.3
-
5
-
-
77955115473
-
Practicing safe computing: Message framing, self-view, and home computer user security behaviour intentions
-
Milwaukee, WI
-
C. L. Anderson and R. Agarwal, "Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behaviour Intentions", International Conference on Information Systems, Milwaukee, WI, pp. 1543-1561, 2006.
-
(2006)
International Conference on Information Systems
, pp. 1543-1561
-
-
Anderson, C.L.1
Agarwal, R.2
-
6
-
-
33748968091
-
-
(Accessed date: 04 April 2011.)
-
CNN. com, "A convicted hacker debunks some myths", 2005, http://www.cnn.com/2005/TECH/internet/10/07/kevin.mitnick.cnna/index.html. (Accessed date: 04 April 2011.)
-
(2005)
A Convicted Hacker Debunks Some Myths
-
-
-
7
-
-
34247142015
-
A study of design requirements for mobile learning environments
-
1652376, Proceedings - Sixth International Conference on Advanced Learning Technologies, ICALT 2006
-
D. Parsons, H. Ryu and M. Cranshaw, "A Study of Design Requirements for Mobile Learning Environments", Proceedings of the Sixth IEEE International Conference on Advanced Learning Technologies, pp. 96-100, 2006. (Pubitemid 46591563)
-
(2006)
Proceedings - Sixth International Conference on Advanced Learning Technologies, ICALT 2006
, vol.2006
, pp. 96-100
-
-
Parsons, D.1
Ryu, H.2
Cranshaw, M.3
-
8
-
-
84876745500
-
Social learning through gaming
-
Vienna, Austria
-
E. M. Raybourn and A. Waern, "Social Learning Through Gaming", Proceedings of CHI 2004, Vienna, Austria, pp. 1733-1734,2004
-
(2004)
Proceedings of CHI 2004
, pp. 1733-1734
-
-
Raybourn, E.M.1
Waern, A.2
-
9
-
-
60649084770
-
Avoidance of information technology threats: A theoretical perspective
-
H. Liang and Y. Xue, "Avoidance of Information Technology Threats: A Theoretical Perspective", MIS Quarterly, vol. 33 (1), pp. 71-90, 2009.
-
(2009)
MIS Quarterly
, vol.33
, Issue.1
, pp. 71-90
-
-
Liang, H.1
Xue, Y.2
-
10
-
-
77955121478
-
Understanding security behaviours in personal computer usage: A threat avoidance perspective
-
July
-
H. Liang and Y. Xue, "Understanding Security Behaviours in Personal Computer Usage: A Threat Avoidance Perspective", Journal of the Association for Information Systems, vol. 11 (7), pp. 394-413, July 2010.
-
(2010)
Journal of the Association for Information Systems
, vol.11
, Issue.7
, pp. 394-413
-
-
Liang, H.1
Xue, Y.2
-
11
-
-
80052602840
-
Practicing safe computing: Message freaming, self-view and home computer user security behaviour intentions
-
Retrieved from. (Accessed date: 15 March 2011)
-
H. Susan, A. Catherine and A. Ritu, "Practicing Safe Computing: Message Freaming, Self-View and Home Computer User Security Behaviour Intentions", ICIS 2006 Proceedings, pp. 93, 2006, Retrieved from http://aisel.aisnet.org/icis2006/93. (Accessed date: 15 March 2011.)
-
(2006)
ICIS 2006 Proceedings
, pp. 93
-
-
Susan, H.1
Catherine, A.2
Ritu, A.3
-
12
-
-
84869780575
-
A protection motivation theory approach to home wireless security
-
Las Vegas, NY
-
I. Woon, G. W. Tan and R. Low, "A Protection Motivation Theory Approach to Home Wireless Security", International Conference on Information Systems, Las Vegas, NY., pp. 367-380, 2005.
-
(2005)
International Conference on Information Systems
, pp. 367-380
-
-
Woon, I.1
Tan, G.W.2
Low, R.3
-
13
-
-
34547986873
-
Guidelines for handheld mobile device interface design
-
Boston, Massachusetts
-
J. Gong and P. Tarasewich, "Guidelines for Handheld Mobile Device Interface Design", Proceedings of Decision Sciences Institute, Annual Meeting, Boston, Massachusetts, pp. 3751-3756, 2004.
-
(2004)
Proceedings of Decision Sciences Institute, Annual Meeting
, pp. 3751-3756
-
-
Gong, J.1
Tarasewich, P.2
-
14
-
-
0038583091
-
At home with the technology: An ethnographic study of a set-top-box trial
-
J. O'Brien, T. Rodden, M. Rouncefield and J. Hughes, "At Home with the Technology: An Ethnographic Study of a Set-Top-Box Trial", ACM Transactions on Computer-Human Interaction, vol. 6 (3), pp.282-308, 1999.
-
(1999)
ACM Transactions on Computer-Human Interaction
, vol.6
, Issue.3
, pp. 282-308
-
-
O'Brien, J.1
Rodden, T.2
Rouncefield, M.3
Hughes, J.4
-
15
-
-
77953906935
-
Behavioural response to phishing risk
-
October, Pittsburgh, Pennsylvania, Retrieved from doi>10.1145/1299015. 1299019. (Accessed date: 25 March 2011)
-
J. S. Downs, M. Holbrook and L. F. Cranor, "Behavioural response to phishing risk", Proceedings of the anti-phishing working groups - 2nd annual eCrime researchers summit, pp.37-44, October 2007, Pittsburgh, Pennsylvania, Retrieved from doi>10.1145/1299015.1299019. (Accessed date: 25 March 2011)
-
(2007)
Proceedings of the Anti-phishing Working Groups - 2nd Annual ECrime Researchers Summit
, pp. 37-44
-
-
Downs, J.S.1
Holbrook, M.2
Cranor, L.F.3
-
16
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
K. Aytes and C. Terry, "Computer Security and Risky Computing Practices: A Rational Choice Perspective", Journal of Organizational and End User Computing, vol. 16 (2), pp. 22-40, 2004.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.2
, pp. 22-40
-
-
Aytes, K.1
Terry, C.2
-
19
-
-
77749232599
-
Digital game-based learning revolution
-
New York
-
M. Prensky, "Digital Game-Based Learning Revolution", Digital GameBased Learning, New York, 2001.
-
(2001)
Digital GameBased Learning
-
-
Prensky, M.1
-
20
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
M. Workman, W. H. Bommer and D. Straub, "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test", Computers in Human Behaviour, vol. 24 (6), pp. 2799-2816,2008.
-
(2008)
Computers in Human Behaviour
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
-
21
-
-
80052566865
-
Do security toolbars actually prevent phishing attacks?
-
M. Wu, R. Miller, and S. Garfinkel, "Do Security Toolbars Actually Prevent Phishing Attacks?", Posters SOUPS, 2005.
-
(2005)
Posters SOUPS
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
-
22
-
-
35348906237
-
Protecting people from phishing: The design and evaluation of an embedded training email system
-
San Jose, California, USA, April - May
-
P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong and E. Nunge, "Protecting people from phishing: the design and evaluation of an embedded training email system", Proceedings of the SIGCHI conference on Human Factors in Computing Systems, San Jose, California, USA, April - May 2007.
-
(2007)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
Nunge, E.6
-
23
-
-
77955301785
-
Phishing, pharming and identity theft
-
R. G. Brody, E. Mulig and V. Kimball, "Phishing, pharming and identity theft", Journal of Academy of Accounting and Financial Studies, vol. 11, pp. 43-56,2007.
-
(2007)
Journal of Academy of Accounting and Financial Studies
, vol.11
, pp. 43-56
-
-
Brody, R.G.1
Mulig, E.2
Kimball, V.3
-
24
-
-
80052591385
-
-
September 2006, Retrieved from. (Accessed date: 27 March 2011)
-
R. Richmond, "Hackers set up attacks on home PCs, Financial Firms: study", September 2006, Retrieved from http://www.marketwatch. com/News/Story/Story.aspx?dist=new sfinder&siteid=google&guid= %7B92615073-95B6-452EA3B9 569BEACF91E8%7D&keyword=. (Accessed date: 27 March 2011. )
-
Hackers Set Up Attacks on Home PCs, Financial Firms: Study
-
-
Richmond, R.1
-
25
-
-
33748964605
-
Don't be a phish: Steps in user education
-
26 - 28 June, Bologna, Italy, Retrieved from doi> 10.1145/1140124. 1140187. (Accessed date: 29 March 201l.)
-
S. A. Robila, J. W. Ragucci, "Don't be a phish: steps in user education", Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, 26 - 28 June 2006, Bologna, Italy, Retrieved from doi>10.1145/1140124.1140187. (Accessed date: 29 March 201l.)
-
(2006)
Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education
-
-
Robila, S.A.1
Ragucci, J.W.2
-
26
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
Alexandria, Virginia, USA, November
-
S. Garera, N. Provos, M. Chew, A. D. Rubin, "A framework for detection and measurement of phishing attacks", Proceedings of the 2007 ACM workshop on Recurring malcode, Alexandria, Virginia, USA, November 2007.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
28
-
-
60649113812
-
Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish
-
Pittsburgh, Pennsylvania, July
-
S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor, J. Hong and E. Nunge, "Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish", Proceedings of the 3rd symposium on Usable privacy and security, Pittsburgh, Pennsylvania, July 2007.
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
29
-
-
34848911641
-
Social phishing
-
DOI 10.1145/1290958.1290968, 1290968
-
T. Jagatic, N. Johnson, M. Jakobsson and F. Menczer, "Social Phishing", Communications of the ACM, vol. 50 (10), pp. 94-100, 2007. (Pubitemid 47505005)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
30
-
-
48849091034
-
Mobile entertainment: Playability heuristics for mobile games
-
X. Korhonen and X. Koivisto, "Mobile Entertainment: Playability Heuristics for Mobile Games", Proceedings of Mobile HCI, 2006.
-
(2006)
Proceedings of Mobile HCI
-
-
Korhonen, X.1
Koivisto, X.2
|