Author of the publication

A Structured Comparison of Social Engineering Intelligence Gathering Tools.

, , , and . TrustBus, volume 10442 of Lecture Notes in Computer Science, page 232-246. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How nostalgic feelings impact Pokémon Go players - integrating childhood brand nostalgia into the technology acceptance theory., and . Behav. Inf. Technol., 39 (12): 1276-1296 (2020)PERSUADED: Fighting Social Engineering Attacks with a Serious Game., , and . TrustBus, volume 11033 of Lecture Notes in Computer Science, page 103-118. Springer, (2018)A Structured Comparison of the Corporate Information Security Maturity Level., and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 223-237. Springer, (2019)Acceptance Factors and Obstacles for Cryptocurrency Adoption., , and . EICC, page 26-33. ACM, (2023)User Acceptance Criteria for Privacy Preserving Machine Learning Techniques., , and . ARES, page 149:1-149:8. ACM, (2023)Virtual Optical Bench: A VR learning tool for optical design., , , , and . VR Workshops, page 635-636. IEEE, (2021)Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust., and . AMCIS, Association for Information Systems, (2018)How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor., and . HICSS, page 1-10. ScholarSpace, (2019)Example Process for Designing a Hybrid User Interface for a Multi-Robot System., , , , , , and . VR Workshops, page 563-564. IEEE, (2023)Easing the Burden of Security Self-Assessments., , , , and . HAISA, page 272-281. University of Plymouth, (2018)