Author of the publication

Human Factors in Phishing Attacks: A Systematic Literature Review.

, , , , and . ACM Comput. Surv., 54 (8): 173:1-173:35 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual Query Systems: A Taxonomy., , , and . VDB, volume A-7 of IFIP Transactions, page 153-168. North-Holland, (1991)A Holistic Approach to the Evaluation of E-Learning Systems., , , , and . HCI (7), volume 4556 of Lecture Notes in Computer Science, page 530-538. Springer, (2007)An Information Visualization Approach to Hospital Shifts Scheduling., , , , and . HCI (4), volume 5613 of Lecture Notes in Computer Science, page 439-447. Springer, (2009)Visual Metaphor., and . Encyclopedia of Database Systems, Springer US, (2009)Principles for Human-Centred Design of IR Interfaces., and . PROMISE Winter School, volume 7757 of Lecture Notes in Computer Science, page 28-47. Springer, (2012)Panel: Data Models, Visual Representations, Metaphors: How to Solve the Puzzle?, , , , and . VDB, volume 34 of IFIP Conference Proceedings, page 177-182. Chapman & Hall, (1995)From user notations to accessible interfaces through visual languages., , , and . HCI, page 252-256. Lawrence Erlbaum, (2001)Introduction to the Special Issue on Visual Query Systems., and . J. Vis. Lang. Comput., 6 (1): 1-2 (1995)Modeling Users in an Adaptive Visual Interface for Database Systems., , and . J. Vis. Lang. Comput., 4 (2): 143-159 (1993)End users as co-designers of their own tools and products., , , , and . J. Vis. Lang. Comput., 23 (2): 78-90 (2012)