From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails., , , и . CoRR, (2016)Factors that Influence Information Security Behavior: An Australian Web-Based Study., , , , и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 231-241. Springer, (2015)Aligning Cyber-Security Training to Individual Cognitive Style., , , , , , и . HAISA, стр. 132-142. University of Plymouth, (2019)Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture., , , , , и . HAISA, стр. 12-23. University of Plymouth, (2017)Scenario testing methodology for the assessment of screening technologies., , , , , и . Int. J. Knowl. Learn., 7 (1/2): 25-38 (2011)An assessment of email and spontaneous dialog visualizations., , , , , , и . Int. J. Hum. Comput. Stud., 70 (6): 432-449 (2012)Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience?, , , , , и . HAISA, стр. 1-11. University of Plymouth, (2018)A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses., , , , , и . Australas. J. Inf. Syst., (2017)The Information Security Awareness of Bank Employees., , , , , и . HAISA, стр. 189-198. University of Plymouth, (2016)Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?, , , , , и . CoRR, (2016)