-
1
-
-
84878272991
-
Who is more susceptible to phishing emails?: A Saudi Arabian study
-
3-5 December 2012, Geelong
-
Alseadoon, I., Chan, T., Foo, E. and Nieto, J.G. (2012), "Who is more susceptible to phishing emails?: a Saudi Arabian study", Proceedings of the 23rd Australasian Conference on Information Systems 2012, 3-5 December 2012, Geelong.
-
(2012)
Proceedings of the 23rd Australasian Conference on Information Systems 2012
-
-
Alseadoon, I.1
Chan, T.2
Foo, E.3
Nieto, J.G.4
-
3
-
-
67651021787
-
Social engineering: Assessing vulnerabilities in practice
-
Bakhshi, T., Papadaki, M. and Furnell, S. (2009), "Social engineering: assessing vulnerabilities in practice", Information Management & Computer Security, Vol. 17 No. 1, pp. 53-63.
-
(2009)
Information Management & Computer Security
, vol.17
, Issue.1
, pp. 53-63
-
-
Bakhshi, T.1
Papadaki, M.2
Furnell, S.3
-
5
-
-
34250177210
-
The predictive validity of multiple-item versus single-item measures of the same constructs
-
Bergkvist, L. and Rossiter, J.R. (2007), "The predictive validity of multiple-item versus single-item measures of the same constructs", Journal of Marketing Research, Vol. 44 No. 2, pp. 175-184.
-
(2007)
Journal of Marketing Research
, vol.44
, Issue.2
, pp. 175-184
-
-
Bergkvist, L.1
Rossiter, J.R.2
-
6
-
-
84876570327
-
Future directions for behavioral information security research
-
Crossler, R.E. Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R. (2013), "Future directions for behavioral information security research", Computers & Security, Vol. 32 No. 1, pp. 90-101.
-
(2013)
Computers & Security
, vol.32
, Issue.1
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hu, Q.4
Warkentin, M.5
Baskerville, R.6
-
8
-
-
2342548557
-
-
Wiley Publishing, Indianapolis, IN
-
D Mitnick, K. and L Simon, W. (2002), The Art of Deception: Controlling the Human Element of Security, Wiley Publishing, Indianapolis, IN.
-
(2002)
The Art of Deception: Controlling the Human Element of Security
-
-
Mitnick, K.D.1
Simon, W.L.2
-
9
-
-
33846794868
-
Phishing for user security awareness
-
Dodge, R., Carver, C. and Ferguson, A. (2007), "Phishing for user security awareness", Computers & Security, Vol. 26 No. 1, pp. 73-80.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 73-80
-
-
Dodge, R.1
Carver, C.2
Ferguson, A.3
-
10
-
-
0003570260
-
-
3rd ed., Allyn & Bacon, The University of Michigan, Boston
-
Glass, G.V. and Hopkins, K.D. (1995), Statistical Methods in Education and Psychology, 3rd ed., Allyn & Bacon, The University of Michigan, Boston.
-
(1995)
Statistical Methods in Education and Psychology
-
-
Glass, G.V.1
Hopkins, K.D.2
-
11
-
-
84893539222
-
Cyber security for a smart grid - What about Phishing?
-
Lyngby
-
Holm, H., Rocha Flores, W. and Ericsson, G. (2013), "Cyber security for a smart grid - what about Phishing?", Proceedings of the 4th European Innovative Smart Grid Technologies (ISGT) Conference, Lyngby.
-
(2013)
Proceedings of the 4th European Innovative Smart Grid Technologies (ISGT) Conference
-
-
Holm, H.1
Rocha Flores, W.2
Ericsson, G.3
-
12
-
-
34848911641
-
Social phishing
-
Jagatic, T.N., Johnson, N.A., Jakobsson, M. and Menczer, F. (2007), "Social phishing", Communications of the ACM, Vol. 50 No. 10, pp. 94-100.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
13
-
-
34249852316
-
Designing ethical phishing experiments
-
ACM Press, New York, NY
-
Jakobsson, M. and Ratkiewicz, J. (2006), "Designing ethical phishing experiments", Proceedings of the 15th international conference on World Wide Web -WWW'06, ACM Press, New York, NY, p. 513.
-
(2006)
Proceedings of the 15th International Conference on World Wide Web -WWW'06
, pp. 513
-
-
Jakobsson, M.1
Ratkiewicz, J.2
-
14
-
-
84879341574
-
Phishing for phishing awareness
-
Jansson, K. and von Solms, R. (2013), "Phishing for phishing awareness", Behaviour & Information Technology, Vol. 32 No. 6, pp. 584-593.
-
(2013)
Behaviour & Information Technology
, vol.32
, Issue.6
, pp. 584-593
-
-
Jansson, K.1
Von Solms, R.2
-
15
-
-
84863815708
-
Social engineering: The neglected human factor for information security management
-
Luo, X., Brody, R., Seazzu, A. and Burd, S. (2011), "Social engineering: the neglected human factor for information security management", Information Resources Management Journal, Vol. 24 No. 3, pp. 1-8.
-
(2011)
Information Resources Management Journal
, vol.24
, Issue.3
, pp. 1-8
-
-
Luo, X.1
Brody, R.2
Seazzu, A.3
Burd, S.4
-
16
-
-
68749094117
-
Learning with computer-based learning environments: A literature review of computer self-efficacy
-
Moos, D.C. and Azevedo, R. (2009), "Learning with computer-based learning environments: a literature review of computer self-efficacy", Review of Educational Research, Vol. 79 No. 2, pp. 576-600.
-
(2009)
Review of Educational Research
, vol.79
, Issue.2
, pp. 576-600
-
-
Moos, D.C.1
Azevedo, R.2
-
17
-
-
84873466899
-
Social engineering audits using anonymous surveys - Conning the users in order to know if they can be conned
-
Las Vegas
-
Nohlberg, M. (2005), "Social engineering audits using anonymous surveys - conning the users in order to know if they can be conned", Proceedings of the 4th Security Conference, Las Vegas.
-
(2005)
Proceedings of the 4th Security Conference
-
-
Nohlberg, M.1
-
18
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P.M., Mackenzie, S.B., Lee, J.Y. and Podsakoff, N.P. (2003), "Common method biases in behavioral research: a critical review of the literature and recommended remedies", The Journal of applied psychology, Vol. 88 No. 5, pp. 879-903.
-
(2003)
The Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
19
-
-
80053650188
-
All your iFRAMEs point to Us
-
USENIX Association, Johns Hopkins University
-
Provos, N., Mavrommatis, P., Rajab, M.A. and Monrose, F. (2008), "All your iFRAMEs point to Us", Proceedings of the 17th conference on Security symposium, USENIX Association, Johns Hopkins University, pp. 1-15.
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
20
-
-
71949094501
-
Self-efficacy in information security: Its influence on end users' information security practice behavior
-
Rhee, H.-S., Kim, C. and Ryu, Y.U. (2009), "Self-efficacy in information security: its influence on end users' information security practice behavior", Computers & Security, Vol. 28 No. 8, pp. 816-826.
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 816-826
-
-
Rhee, H.-S.1
Kim, C.2
Ryu, Y.U.3
-
21
-
-
77954007030
-
Who falls for phish?
-
ACM Press, New York, NY
-
Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F. and Downs, J. (2010), "Who falls for phish?", Proceedings of the 28th International Conference on Human Factors in Computing Systems - CHI '10, ACM Press, New York, NY, p. 373.
-
(2010)
Proceedings of the 28th International Conference on Human Factors in Computing Systems - CHI '10
, pp. 373
-
-
Sheng, S.1
Holbrook, M.2
Kumaraguru, P.3
Cranor, L.F.4
Downs, J.5
-
22
-
-
39749142244
-
Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
-
Workman, M. (2008), "Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security", Journal of the American Society for Information Science and Technology, Vol. 59 No. 4, pp. 662-674.
-
(2008)
Journal of the American Society for Information Science and Technology
, vol.59
, Issue.4
, pp. 662-674
-
-
Workman, M.1
|