Author of the publication

Does the Anchoring Effect Influence Individuals' Anti-phishing Behavior Intentions?

, , , , and . FPS (1), volume 14551 of Lecture Notes in Computer Science, page 141-156. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of Landing and Distribution Domains Using Whois' Text Mining., , , , , and . TrustCom/BigDataSE/ICESS, page 1-8. IEEE Computer Society, (2017)Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior., , , , , and . CHI, page 2202-2214. ACM, (2017)Messages and Incentives to Promote Updating of Software on Smartphones., , , and . AINA (4), volume 202 of Lecture Notes on Data Engineering and Communications Technologies, page 187-200. Springer, (2024)Survey on Recognition of Privacy Risk from Responding on Twitter., , and . TrustCom, page 1774-1780. IEEE, (2023)Human Factors in Homograph Attack Recognition., , , , , , and . ACNS (2), volume 12147 of Lecture Notes in Computer Science, page 408-435. Springer, (2020)SeBeST: Security Behavior Stage Model and Its Application to OS Update., , , and . AINA (2), volume 226 of Lecture Notes in Networks and Systems, page 552-566. Springer, (2021)Designing Personalized OS Update Message based on Security Behavior Stage Model., , , , and . PST, page 1-9. IEEE, (2021)Understanding the time-series behavioral characteristics of evolutionally advanced email spammers., , and . AISec, page 71-80. ACM, (2012)On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic., , , and . ICNC, page 1-6. IEEE Computer Society, (2012)Analysis of Trust Factors in Children's Abilities to Use Digital Devices., , , and . GoodIT, page 82-88. ACM, (2022)