From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?, , , , , и . CoRR, (2016)The design of phishing studies: Challenges for researchers., , , , и . Comput. Secur., (2015)Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails., , , , и . HAISA, стр. 30-41. University of Plymouth, (2014)An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations., , , , и . EISMC, стр. 34-44. Plymouth University, (2013)A study of information security awareness in Australian government organisations., , , , и . Inf. Manag. Comput. Secur., 22 (4): 334-345 (2014)Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think., , , , и . HAISA, стр. 12-21. University of Plymouth, (2016)Risk Communication, Risk Perception and Information Security., и . IICIS, том 193 из IFIP, стр. 175-184. Springer, (2004)Factors that Influence Information Security Behavior: An Australian Web-Based Study., , , , и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 231-241. Springer, (2015)The Information Security Awareness of Bank Employees., , , , , и . HAISA, стр. 189-198. University of Plymouth, (2016)Assessing information security attitudes: a comparison of two studies., , , , и . Inf. Comput. Secur., 24 (2): 228-240 (2016)