How Effective is Anti-Phishing Training for Children?
暂无分享,去创建一个
Pieter H. Hartel | Marianne Junger | Elmer Lastdrager | Inés Carvajal Gallardo | P. Hartel | M. Junger | Elmer Lastdrager | Inés Carvajal Gallardo
[1] Judee K. Burgoon,et al. Advances in deception detection , 2010 .
[2] Lorrie Faith Cranor,et al. School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.
[3] E. Rutger Leukfeldt,et al. Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization , 2014, Cyberpsychology Behav. Soc. Netw..
[4] Malcolm Robert Pattinson,et al. The design of phishing studies: Challenges for researchers , 2015, Comput. Secur..
[5] Christian A. Meissner,et al. Does Training Improve the Detection of Deception? A Meta-Analysis , 2016, Commun. Res..
[6] Timothy R. Levine,et al. Accuracy in detecting truths and lies: Documenting the “veracity effect” , 1999 .
[7] Lorrie Faith Cranor,et al. Lessons from a real world evaluation of anti-phishing training , 2008, 2008 eCrime Researchers Summit.
[8] Patrick G. Nyeste,et al. Training Users to Counteract Phishing , 2010, Work.
[9] Swapan Purkait,et al. Information Management & Computer Security Phishing counter measures and their effectiveness – literature review , 2016 .
[10] L. Haddon,et al. EU Kids Online: national perspectives , 2012 .
[11] D. Kahneman. Thinking, Fast and Slow , 2011 .
[12] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[13] Rick Wash,et al. Stories as informal lessons about security , 2012, SOUPS.
[14] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[15] Malcolm Munro,et al. An Evaluation of Users' Anti-Phishing Knowledge Retention , 2009, 2009 International Conference on Information Management and Engineering.
[16] Ibrahim Mohammed A. Alseadoon,et al. The impact of users' characteristics on their ability to detect phishing emails , 2014 .
[17] Lois Ann Scheidt,et al. It’s Complicated: The Social Lives of Networked Teens , 2015, New Media Soc..
[18] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[19] Jeff Chester,et al. The new threat of digital marketing. , 2012, Pediatric clinics of North America.
[20] Jason Hong,et al. The state of phishing attacks , 2012, Commun. ACM.
[21] Luis de Marcos,et al. Gamifying learning experiences: Practical implications and outcomes , 2013, Comput. Educ..
[22] Yada Zhu,et al. Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[23] John A. Clark,et al. F for fake: four studies on how we fall for phish , 2011, CHI.
[24] Stefan A. Robila,et al. Don't be a phish: steps in user education , 2006, ITICSE '06.
[25] Lorrie Faith Cranor,et al. Teaching Johnny not to fall for phish , 2010, TOIT.
[26] Sandra L. Calvert. Children as Consumers: Advertising and Marketing , 2008, The Future of children.
[27] Pieter H. Hartel,et al. Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention , 2016, SG-CRC.
[28] H. Eysenck. THINKING , 1958 .
[29] Lorrie Faith Cranor,et al. Getting users to pay attention to anti-phishing education: evaluation of retention and transfer , 2007, eCrime '07.
[30] P. Slovic. Risk-taking in children: Age and sex differences. , 1966 .
[31] Jacob Cohen,et al. A power primer. , 1992, Psychological bulletin.
[32] Alex Tsow. Deceit and Deception : A Large User Study of Phishing , 2007 .