Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scenario testing methodology for the assessment of screening technologies., , , , , and . Int. J. Knowl. Learn., 7 (1/2): 25-38 (2011)Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness?, , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 232-249. Springer, (2020)An assessment of email and spontaneous dialog visualizations., , , , , , and . Int. J. Hum. Comput. Stud., 70 (6): 432-449 (2012)Predicting susceptibility to social influence in phishing emails., , , and . Int. J. Hum. Comput. Stud., (2019)Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience?, , , , , and . HAISA, page 1-11. University of Plymouth, (2018)Self-disclosing on Facebook can be Risky: Examining the Role of Trust and Social Capital., , , and . HAISA, page 225-235. University of Plymouth, (2018)A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses., , , , , and . Australas. J. Inf. Syst., (2017)The Information Security Awareness of Bank Employees., , , , , and . HAISA, page 189-198. University of Plymouth, (2016)'Anti'-Social Media: Narcissism and Self-Control as Predictors of Facebook Self-Disclosure., , , and . ACIS, page 51. (2017)Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails., , , and . CoRR, (2016)