From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design principles for cognitively accessible cybersecurity training., , и . Comput. Secur., (февраля 2024)The Language Effect in Phishing Susceptibility., , и . STPIS, том 2789 из CEUR Workshop Proceedings, стр. 162-167. CEUR-WS.org, (2020)The impact of short-term memory on phishing detection ability and password behaviour., , , и . STPIS, том 3598 из CEUR Workshop Proceedings, стр. 160-173. CEUR-WS.org, (2023)Online Fraud Defence by Context Based Micro Training., и . HAISA, стр. 256-264. University of Plymouth, (2015)Defining and Modelling the Online Fraud Process., и . HAISA, стр. 203-213. University of Plymouth, (2018)Cyberthreats in Modern Cars: Responsibility and Readiness of Auto Workshops., , и . HAISA, том 674 из IFIP Advances in Information and Communication Technology, стр. 275-284. Springer, (2023)Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?, , и . HAISA, том 613 из IFIP Advances in Information and Communication Technology, стр. 12-21. Springer, (2021)Automatic Detection of Fake News., , и . STPIS, том 2789 из CEUR Workshop Proceedings, стр. 168-179. CEUR-WS.org, (2020)An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks., , , и . EDOC Workshops, стр. 357-363. IEEE Computer Society, (2014)978-1-4799-5470-4.User perception of Context-Based Micro-Training - a method for cybersecurity training., , и . Inf. Secur. J. A Glob. Perspect., 33 (2): 121-137 (марта 2024)