-
2
-
-
77957844743
-
Intelligent phishing detection system for e-banking using fuzzy data mining
-
Aburrous, M., et al., 2010 Intelligent phishing detection system for e-banking using fuzzy data mining. Expert systems with applications, 37 (12), 7913
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.12
, pp. 7913
-
-
Aburrous, M.1
-
3
-
-
33846794868
-
Phishing for user security awareness
-
Dodge, J., Carver, C., and Ferguson, A.J., 2007. Phishing for user security awareness. Computers & Security, 26 (1), 73-80
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 73-80
-
-
Dodge, J.1
Carver, C.2
Ferguson, A.J.3
-
4
-
-
35348822468
-
Fostering e-mail security awareness: The West Point Carronade
-
Ferguson, A.J., 2005 Fostering e-mail security awareness: The West Point Carronade. EDUCAUSE Quarterly, 28 (1), 54-57
-
(2005)
EDUCAUSE Quarterly
, vol.28
, Issue.1
, pp. 54-57
-
-
Ferguson, A.J.1
-
5
-
-
0036631839
-
Education ondemand: The development of a simulator-based medical education service
-
[Accessed 4 November 2011]
-
Gordon, J.A and Pawlowski, J., 2002. Education ondemand: the development of a simulator-based medical education service. Academic Medicine, 77 (7). Available from: http://journals.lww.com/academicmedicine/Fulltext/2002/07000/ Education-On-demand-The-Development-of-a.42.aspx [Accessed 4 November 2011]
-
(2002)
Academic Medicine
, vol.77
, pp. 7
-
-
Gordon, J.A.1
Pawlowski, J.2
-
6
-
-
24644444290
-
-
Information security practice and experience: first international conference, ISPEC 2005, 11-14 April 2005, Singapore Berlin: Springer-Verlag
-
Hasle, H., et al., 2005. Measuring resistance to social engineering. In: Information security practice and experience: first international conference, ISPEC 2005, 11-14 April 2005, Singapore Berlin: Springer-Verlag, 132-143
-
(2005)
Measuring Resistance to Social Engineering
, pp. 132-143
-
-
Hasle, H.1
-
8
-
-
41949126461
-
Why and how to perform fraud experiments
-
Jakobsson, M., Finn, P., and Johnson, N., 2008. Why and how to perform fraud experiments. Security & Privacy, IEEE, 6 (2), 66-68
-
(2008)
Security & Privacy IEEE
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Finn, P.2
Johnson, N.3
-
9
-
-
34249852316
-
-
Proceedings of the 15th international conference on world wide web, 23-26 May 2006, Edinburgh, Scotland New York: ACM Press
-
Jakobsson, M., and Ratkiewicz, J., 2006. Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In: Proceedings of the 15th international conference on world wide web, 23-26 May 2006, Edinburgh, Scotland New York: ACM Press, 513-522
-
(2006)
Designing Ethical Phishing Experiments: A Study of (ROT13) ROnl Query Features
, pp. 513-522
-
-
Jakobsson, M.1
Ratkiewicz, J.2
-
10
-
-
84926177314
-
Social engineering: Towards a holistic solution
-
South African Information Security Multi-Conference 17-18 May 2010, Port Elizabeth Plymouth: Plymouth University
-
Jansson, K. and von Solms, R., 2010. Social engineering: towards a holistic solution. In: Proceedings of the South African information security multi-conference (SAISMC 2010). South African Information Security Multi-Conference, 17-18 May 2010, Port Elizabeth Plymouth: Plymouth University
-
(2010)
Proceedings of the South African Information Security Multi-conference (SAISMC 2010)
-
-
Jansson, K.1
Von Solms, R.2
-
13
-
-
84856394640
-
-
Aldershot, UK: Gower Publishing, Ltd. Oxford English Dictionary 2009. Oxford English dictionary, [Accessed 1 November 2011]
-
Mann, I., 2008. Hacking the human: social engineering techniques and security countermeasures. Aldershot, UK: Gower Publishing, Ltd. Oxford English Dictionary, 2009. Oxford English dictionary [online]. Available from: http://dictionary.oed.com/cgi/entry/00323586/00323586se1?single-1&query- type-word &queryword-Neurolinguisticprogramming&first-1& max-to-show-10&hilite-00323586se1 [Accessed 1 November 2011]
-
(2008)
Hacking the Human: Social Engineering Techniques and Security Countermeasures
-
-
Mann, I.1
-
15
-
-
36849073159
-
Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish
-
18-20 July 2007 Pittsburgh
-
Sheng, S., et al., 2007. Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd symposium on usable privacy and security, 18-20 July 2007, Pittsburgh. 88-99
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security
, pp. 88-99
-
-
Sheng, S.1
-
16
-
-
41949111662
-
Using cartoons to teach internet security
-
Srikwan, S. and Jakobsson, M., 2008. Using cartoons to teach internet security. Cryptologia, 32 (2), 137-154
-
(2008)
Cryptologia
, vol.32
, Issue.2
, pp. 137-154
-
-
Srikwan, S.1
Jakobsson, M.2
-
17
-
-
36349023276
-
-
H Venter M. Eloff, L. Labuschagne, J. Eloff, and R. Von Solms, eds. New approaches for security, privacy and trust in complex environments. IFIP International Federation for Information Processing. Boston: Springer
-
Steyn, T., Kruger, H., and Drevin, L., 2007. Identity theft-empirical evidence from a phishing exercise In: H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. Von Solms, eds. New approaches for security, privacy and trust in complex environments. IFIP International Federation for Information Processing. Boston: Springer, 193-203
-
(2007)
Identity Theft-empirical Evidence from A Phishing Exercise
, pp. 193-203
-
-
Steyn, T.1
Kruger, H.2
Drevin, L.3
-
18
-
-
84879339199
-
-
(July-September 2010) [online] Symantec Corporation, pdf [Accessed 16 February 2011]
-
Symantec, 2010a. Symantec intelligence quarterly: global report (July-September 2010) [online] Symantec Corporation. Available from: http://www.symantec.com/content/en/us/enterprise/white-papers/ b-symc-intelligence-qtrly-july-to-sept-WP-21157366.en-us.pdf [Accessed 16 February 2011]
-
Symantec 2010a. Symantec Intelligence Quarterly: Global Report
-
-
-
20
-
-
84856381706
-
-
M. Gupta and R. Sharman, eds. Handbook of research on social and organizational liabilities in information security. Hershey, PA: IGI Global
-
Twitchell, D., 2009. Social engineering and its countermeasures. In: M. Gupta and R. Sharman, eds. Handbook of research on social and organizational liabilities in information security. Hershey, PA: IGI Global, 228-242
-
(2009)
Social Engineering and Its Countermeasures
, pp. 228-242
-
-
Twitchell, D.1
|