Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?, , , , , and . CoRR, (2016)Adapting Cyber-Security Training to Your Employees., , , , , , and . HAISA, page 67-79. University of Plymouth, (2018)Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity?, , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 217-231. Springer, (2020)Assessing information security attitudes: a comparison of two studies., , , , and . Inf. Comput. Secur., 24 (2): 228-240 (2016)More than the individual: Examining the relationship between culture and Information Security Awareness., , and . Comput. Secur., (2020)When believing in technology leads to poor cyber security: Development of a trust in technical controls scale., , , , , and . Comput. Secur., (2020)Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?, , , , , and . ACIS, page 6. (2015)Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q)., , , , , and . ACIS, page 56. (2016)Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness?, , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 232-249. Springer, (2020)The Information Security Awareness of Bank Employees., , , , , and . HAISA, page 189-198. University of Plymouth, (2016)