-
3
-
-
84902248904
-
End of an error
-
D. J. Pond and K.R. Leifheit, "End of an Error," Security Management, 47(5), 2003, pp. 113-117.
-
(2003)
Security Management
, vol.47
, Issue.5
, pp. 113-117
-
-
Pond, D.J.1
Leifheit, K.R.2
-
4
-
-
27144451354
-
Work organization and stress: Systematic problem approaches for employers, managers, and trade union representatives
-
World Health Organization, Geneva, Switzerland
-
S. Leka, A. Griffiths, and T. Cox, "Work Organization and Stress: Systematic Problem Approaches for Employers, Managers, and Trade Union Representatives," Protecting Workers Health Series, No. 3, World Health Organization, Geneva, Switzerland, 2004. http://www.who.int/occupational-health/ publications/pwh3rev.pdf
-
(2004)
Protecting Workers Health Series, No. 3
-
-
Leka, S.1
Griffiths, A.2
Cox, T.3
-
5
-
-
0031234057
-
Cognitive biases and time stress in team decision making
-
P. Lehner, M. Seyed-Solorforough, M.F. O'Connor, S. Sak, and T. Mullin, "Cognitive Biases and Time Stress in Team Decision Making," IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems & Humans, 27, 1997, pp. 698-703.
-
(1997)
IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems & Humans
, vol.27
, pp. 698-703
-
-
Lehner, P.1
Seyed-Solorforough, M.2
O'Connor, M.F.3
Sak, S.4
Mullin, T.5
-
6
-
-
0345888657
-
Traces of fatigue in an attention task
-
E. Soetens, J. Hueting, and F. Wauters, "Traces of Fatigue in an Attention Task," Bulletin of the Psychonomic Society, 30, 1992, pp. 97-100.
-
(1992)
Bulletin of the Psychonomic Society
, vol.30
, pp. 97-100
-
-
Soetens, E.1
Hueting, J.2
Wauters, F.3
-
7
-
-
79955890012
-
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
-
A. Vishwanath, T. Herath, R. Chen, J. Wang, and H. Rao, "Why Do People Get Phished? Testing Individual Differences in Phishing Vulnerability within an Integrated, Information Processing Model," Decision Support Systems, 51(3), 2011, pp. 576-586.
-
(2011)
Decision Support Systems
, vol.51
, Issue.3
, pp. 576-586
-
-
Vishwanath, A.1
Herath, T.2
Chen, R.3
Wang, J.4
Rao, H.5
-
9
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
V. Venkatesh, M. Morris, G.B. Davis, and F.D. Davis, "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, 27(3), 2003, pp. 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.2
Davis, G.B.3
Davis, F.D.4
-
10
-
-
84902274183
-
Why we fall for phishing
-
Vancouver, BC, Canada, May 7-12, 2011, ACM
-
J. Erkkila, "Why We Fall for Phishing," Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI) Vancouver, BC, Canada, May 7-12, 2011, ACM, 2011.
-
(2011)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI)
-
-
Erkkila, J.1
-
11
-
-
77954007030
-
Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions
-
Atlanta, GA, April 10-15, 2010, ACM
-
S. Sheng, M. Holbrook, P. Kumaraguru, L. Cranor, and J. Downs, "Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions," 28th ACM Conference on Human Factors in Computing Systems, Atlanta, GA, April 10-15, 2010, ACM 2010.
-
(2010)
28th ACM Conference on Human Factors in Computing Systems
-
-
Sheng, S.1
Holbrook, M.2
Kumaraguru, P.3
Cranor, L.4
Downs, J.5
-
12
-
-
0040322644
-
Noise, task difficulty, and stroop color-word performance
-
B.K. Houston, "Noise, Task Difficulty, and Stroop Color-Word Performance," Journal of Experimental Psychology 82, 2, 1969, pp. 403-404.
-
(1969)
Journal of Experimental Psychology
, vol.82
, Issue.2
, pp. 403-404
-
-
Houston, B.K.1
-
15
-
-
0001767944
-
Changes in operator efficiency as a function of environmental stress, fatigue, and circadian rhythms
-
K.R. Boff, L. Kaufman, and J.P. Thomas, (Eds.) Wiley
-
G.R.J. Hockey, "Changes in Operator Efficiency as a Function of Environmental Stress, Fatigue, and Circadian Rhythms," in K.R. Boff, L. Kaufman, and J.P. Thomas, (Eds.), Handbook of Perception and Human Performance (Vol. 2), Wiley, 1986.
-
(1986)
Handbook of Perception and Human Performance
, vol.2
-
-
Hockey, G.R.J.1
-
16
-
-
0014278228
-
Anxiety, attention and coping with threat
-
April
-
P.L. Wachtel, "Anxiety, Attention and Coping with Threat," Journal of Abnormal Psychology 73, 2, April 1968, pp. 137-143.
-
(1968)
Journal of Abnormal Psychology
, vol.73
, Issue.2
, pp. 137-143
-
-
Wachtel, P.L.1
-
17
-
-
0029004440
-
Toward a theory of situation awareness in dynamic systems
-
M.R. Endsley, "Toward a Theory of Situation Awareness in Dynamic Systems," Human Factors, 37, 32-64, 1995.
-
(1995)
Human Factors
, vol.37
, pp. 32-64
-
-
Endsley, M.R.1
-
18
-
-
12744260449
-
Post hoc assessment of situation awareness in air traffic control incidents and major aircraft accidents
-
M.R. Endsley and D.J. Garland (Eds). Lawrence Erlbaum Associates, Mahway, NJ
-
M.D. Rodgers, R.H. Mogfor, and B. Strauch, "Post Hoc Assessment of Situation Awareness in Air Traffic Control Incidents and Major Aircraft Accidents," in M.R. Endsley and D.J. Garland (Eds)., Situation Awareness Analysis and Measurement, Lawrence Erlbaum Associates, Mahway, NJ, 2000.
-
(2000)
Situation Awareness Analysis and Measurement
-
-
Rodgers, M.D.1
Mogfor, R.H.2
Strauch, B.3
-
19
-
-
33745816410
-
Why phishing works
-
New York, NY ACM
-
R. Dhamija, J.D. Tygar, and M. Hearst, "Why Phishing Works," Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '06), New York, NY, 2006, ACM, pp. 581-590. http://dl.acm.org/citation.cfm?id= 1124861
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '06)
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
20
-
-
70350616118
-
Failure to recognize fake internet popup warning messages
-
D. Sharek, C. Swofford, and M. Wogalter, "Failure to Recognize Fake Internet Popup Warning Messages," Proceedings of the Human Factors and Ergonomics Society 52nd Annual Meeting, 2008, pp. 557-560.
-
(2008)
Proceedings of the Human Factors and Ergonomics Society 52nd Annual Meeting
, pp. 557-560
-
-
Sharek, D.1
Swofford, C.2
Wogalter, M.3
-
21
-
-
0002427035
-
Workload assessment and prediction
-
H.R. Booher (Ed.) Van Nostrand Reinhold, New York
-
S.G. Hart, and C.D. Wickens, Workload Assessment and Prediction," in H.R. Booher (Ed.), MANPRINT: An Approach to Systems Integration, Van Nostrand Reinhold, New York, 1990, pp. 257-296.
-
(1990)
MANPRINT: An Approach to Systems Integration
, pp. 257-296
-
-
Hart, S.G.1
Wickens, C.D.2
-
23
-
-
0002180672
-
Reconceptualizing the determinants of risk behaviour
-
S.B. Sitkin, and L.R. Pablo, "Reconceptualizing the Determinants of Risk Behaviour," Academy of Management Review 17(1), 1992, pp. 9-38.
-
(1992)
Academy of Management Review
, vol.17
, Issue.1
, pp. 9-38
-
-
Sitkin, S.B.1
Pablo, L.R.2
-
24
-
-
0000125532
-
Prospect theory: An analysis of decisions under risk
-
D. Kahneman, and A. Tversky, "Prospect Theory: An Analysis of Decisions Under Risk," Econometrica, 47(2), 1979, pp. 263-291.
-
(1979)
Econometrica
, vol.47
, Issue.2
, pp. 263-291
-
-
Kahneman, D.1
Tversky, A.2
-
25
-
-
47349086705
-
Sleep and sleepiness of fisherman on rotating shifts
-
P.H. Gander, M. van den Berg, and L. Signal, "Sleep and Sleepiness of Fisherman on Rotating Shifts," Chronobiology International, 25(2&3), 2008, pp. 38-398.
-
(2008)
Chronobiology International
, vol.25
, Issue.2-3
, pp. 38-398
-
-
Gander, P.H.1
Van Den Berg, M.2
Signal, L.3
-
26
-
-
0024409269
-
Neurocognitive impairment: The unrecognized component of dual diagnosis in substance abuse treatment
-
Apr-Jun
-
P.S. Meek, H.W. Clark, and V.L. Solana, "Neurocognitive Impairment: The Unrecognized Component of Dual Diagnosis in Substance Abuse Treatment," Journal of Psychoactive Drugs, Apr-Jun, 21(2), 1989, pp. 153-60.
-
(1989)
Journal of Psychoactive Drugs
, vol.21
, Issue.2
, pp. 153-160
-
-
Meek, P.S.1
Clark, H.W.2
Solana, V.L.3
-
27
-
-
84902265029
-
-
HealthyPeople.gov
-
HealthyPeople.gov, Substance Abuse, 2013. http://healthypeople.gov/2020/ LHI/substanceAbuse.aspx
-
(2013)
Substance Abuse
-
-
-
28
-
-
84902239674
-
-
time.com, December 30
-
A. Park, "Why We Take Risks-It's the Dopamine," time.com, December 30, 2008. http://www.time.com/time/health/article/0,8599,1869106,00. html
-
(2008)
Why We Take Risks-It's the Dopamine
-
-
Park, A.1
-
29
-
-
84878313046
-
-
Decision Sciences Institute
-
J.L. Parrish, Jr., J.L. Bailey, and J.F. Courtney, "A Personality Based Model for Determining Susceptibility to Phishing Attacks," Decision Sciences Institute, 2009, pp. 285-296.
-
(2009)
A Personality Based Model for Determining Susceptibility to Phishing Attacks
, pp. 285-296
-
-
Parrish Jr., J.L.1
Bailey, J.L.2
Courtney, J.F.3
-
30
-
-
28244501333
-
Construct validity of the balloon analog risk task (BART) associations with psychopathy and impulsivity
-
M.K. Hunt, D.R. Hopko, R. Bare, C.W. Lejuez, and E.V. Robinson, "Construct Validity of the Balloon Analog Risk Task (BART) Associations With Psychopathy and Impulsivity," Assessment, 12(4), 2005, pp. 416-428.
-
(2005)
Assessment
, vol.12
, Issue.4
, pp. 416-428
-
-
Hunt, M.K.1
Hopko, D.R.2
Bare, R.3
Lejuez, C.W.4
Robinson, E.V.5
-
31
-
-
34249852316
-
Designing ethical phishing experiments: A study of (ROT13) ronl query features
-
Edinburgh, Scotland, 2006, ACM
-
M. Jakobsson, and J. Ratkiewicz, "Designing Ethical Phishing Experiments: A Study of (ROT13) Ronl Query Features," Proceedings of the 15th International Conference on World Wide Web, Edinburgh, Scotland, 2006, ACM, 2006, pp. 513-522.
-
(2006)
Proceedings of the 15th International Conference on World Wide Web
, pp. 513-522
-
-
Jakobsson, M.1
Ratkiewicz, J.2
-
32
-
-
23844540396
-
Goin' phishing?
-
W. Knight, "Goin' Phishing?," Infosecurity Today (1:4), 2004, pp. 36-38. http://www.sciencedirect.com/science/article/pii/S1742684704000898
-
(2004)
Infosecurity Today
, vol.1
, Issue.4
, pp. 36-38
-
-
Knight, W.1
-
33
-
-
84863618391
-
Phishing in a university community
-
J.G. Mohebzada, A. El Zarka, A.H. Bhojani, A. Darwish, "Phishing in a University Community," International Conference on Innovations in Information Technology (IIT), 2012, pp. 249-254.
-
(2012)
International Conference on Innovations in Information Technology (IIT)
, pp. 249-254
-
-
Mohebzada, J.G.1
El Zarka, A.2
Bhojani, A.H.3
Darwish, A.4
-
34
-
-
84891569166
-
-
(Wiley Series in Agent Technology), John Wiley and Sons, Chichester, UK
-
C. Castelfranchi, and R. Falcone, Trust Theory: A Socio-Cognitive and Computational Model (Wiley Series in Agent Technology), John Wiley and Sons, Chichester, UK, 2010.
-
(2010)
Trust Theory: A Socio-Cognitive and Computational Model
-
-
Castelfranchi, C.1
Falcone, R.2
-
35
-
-
84902259575
-
-
United States Code Section 2000e-16
-
United States Code, Volume 42-The Public Health and Welfare, Section 2000e-16, 1964.
-
(1964)
The Public Health and Welfare
, vol.42
-
-
-
36
-
-
84902256541
-
-
United States Code Chapter 14 - Age Discrimination in Employment, Sec. 621
-
United States Code, Title 29 - Labor, Chapter 14 - Age Discrimination in Employment, Sec. 621.
-
Title 29 - Labor
-
-
-
37
-
-
84875500710
-
Employee monitoring and ethics: Can they co-exist?
-
A.I.T. Kiser, T. Porter, and D. Vequist, "Employee Monitoring and Ethics: Can They Co-Exist?," International Journal of Digital Literacy and Digital Competence, 1(3), 2010, pp. 30-45.
-
(2010)
International Journal of Digital Literacy and Digital Competence
, vol.1
, Issue.3
, pp. 30-45
-
-
Kiser, A.I.T.1
Porter, T.2
Vequist, D.3
-
38
-
-
84857925030
-
Social/ethical issues in predicitve insider threat monitoring
-
M.J. Dark (Ed.) Hershey, PA
-
F.L. Greitzer, D.A. Frincke, and M. Zabriskie, "Social/Ethical Issues in Predicitve Insider Threat Monitoring," in M.J. Dark (Ed.), Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives. Information Science Reference, Hershey, PA, 2010, pp. 132-161.
-
(2010)
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives. Information Science Reference
, pp. 132-161
-
-
Greitzer, F.L.1
Frincke, D.A.2
Zabriskie, M.3
-
39
-
-
0034250223
-
An investigation of risk perception and risk propensity on the decision to continue a software development project
-
M. Keil, L. Wallace, D. Turk, G. Dixon-Randall, and U. Nulden, "An Investigation of Risk Perception and Risk Propensity on the Decision to Continue a Software Development Project," The Journal of Systems and Software 53(2), 2000, pp. 145-157.
-
(2000)
The Journal of Systems and Software
, vol.53
, Issue.2
, pp. 145-157
-
-
Keil, M.1
Wallace, L.2
Turk, D.3
Dixon-Randall, G.4
Nulden, U.5
-
40
-
-
10344249478
-
The framing effect and risky decisions: Examining cognitive functions with fMRI
-
C. Gonzalez, J. Dana, H. Koshino, and M. Just, "The Framing Effect and Risky Decisions: Examining Cognitive Functions with fMRI," Journal of Economic Psychology 26(1), 2005, pp. 1-20.
-
(2005)
Journal of Economic Psychology
, vol.26
, Issue.1
, pp. 1-20
-
-
Gonzalez, C.1
Dana, J.2
Koshino, H.3
Just, M.4
-
41
-
-
0000735208
-
Modes of normal conscious thought
-
K.S. Pope and J.L. Singer (Eds.) Plenum, New York
-
E. Klinger, "Modes of Normal Conscious Thought," in K.S. Pope and J.L. Singer (Eds.), The Stream of Consciousness: Scientific Investigations into the Flow of Human Experience, Plenum, New York, 1978, pp. 225-258.
-
(1978)
The Stream of Consciousness: Scientific Investigations into the Flow of Human Experience
, pp. 225-258
-
-
Klinger, E.1
-
42
-
-
0036593780
-
Evaluation of a behavioral measure of risk taking: The balloon analogue risk task (BART)
-
C.W. Lejuez, J.P. Read, C.W. Kahler, J.B. Richards, S.E. Ramsey, G.L. Stuart, D.R. Strong, and R.A. Brown, "Evaluation of a Behavioral Measure of Risk Taking: The Balloon Analogue Risk Task (BART)," Journal of Experimental Psychology Applied, 8(2), 2002, pp. 75-84.
-
(2002)
Journal of Experimental Psychology Applied
, vol.8
, Issue.2
, pp. 75-84
-
-
Lejuez, C.W.1
Read, J.P.2
Kahler, C.W.3
Richards, J.B.4
Ramsey, S.E.5
Stuart, G.L.6
Strong, D.R.7
Brown, R.A.8
-
43
-
-
84876094205
-
Certainty broadcasts risk preferences: Verbal and nonverbal cues to risk-taking
-
W.G. Moons, J.R. Spoor, A.E. Kalomiris, and M.K. Rizk, "Certainty Broadcasts Risk Preferences: Verbal and Nonverbal Cues to Risk-Taking," Journal of Nonverbal Behavior, 37(2), 2013, pp. 79-89.
-
(2013)
Journal of Nonverbal Behavior
, vol.37
, Issue.2
, pp. 79-89
-
-
Moons, W.G.1
Spoor, J.R.2
Kalomiris, A.E.3
Rizk, M.K.4
-
44
-
-
77649253939
-
The psychological meaning of words: Liwc and computerized text analysis methods
-
Y.R. Tausczik, and J.W. Pennebaker, "The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods," Journal of Language and Social Psychology 29(1), 2010, pp. 24-54.
-
(2010)
Journal of Language and Social Psychology
, vol.29
, Issue.1
, pp. 24-54
-
-
Tausczik, Y.R.1
Pennebaker, J.W.2
-
45
-
-
84875514796
-
Identifying at-risk employees: A behavioral model for predicting potential insider threats
-
Wailea, Maui, Hawaii
-
F.L. Greitzer, L.J. Kangas, C.F. Noonan, A.C. Dalton, and R.E. Hohimer, "Identifying At-Risk Employees: A Behavioral Model for Predicting Potential Insider Threats," 45th Hawaii International Conference on System Sciences (HICSS-45), Wailea, Maui, Hawaii, 2012, pp. 2392-2401.
-
(2012)
45th Hawaii International Conference on System Sciences (HICSS-45)
, pp. 2392-2401
-
-
Greitzer, F.L.1
Kangas, L.J.2
Noonan, C.F.3
Dalton, A.C.4
Hohimer, R.E.5
-
46
-
-
84870631851
-
Controlling insider threats with information security policies (Paper 242)
-
Helsinki, Finland, June 9-11 (2011)
-
A. Yayla, "Controlling Insider Threats with Information Security Policies (Paper 242)," ECIS 2011 Proceedings, Helsinki, Finland, June 9-11, 2011. http://aisel.aisnet.org/ecis2011/242 (2011).
-
(2011)
ECIS 2011 Proceedings
-
-
Yayla, A.1
-
47
-
-
78650225509
-
Business risks and security assessment for mobile devices
-
Vancouver, Canada, June 19-21 ACM, 2007
-
P.M. Milligan, and D. Hutcheson, "Business Risks and Security Assessment for Mobile Devices," Proceedings of the 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics, Vancouver, Canada, June 19-21, 2007, ACM, 2007, pp. 189-193.
-
(2007)
Proceedings of the 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics
, pp. 189-193
-
-
Milligan, P.M.1
Hutcheson, D.2
|