Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace
暂无分享,去创建一个
[1] W. W. Peterson,et al. The theory of signal detectability , 1954, Trans. IRE Prof. Group Inf. Theory.
[2] Jeffrey N Rouder,et al. Detection of patient risk by nurses: a theoretical framework. , 2010, Journal of advanced nursing.
[3] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[4] Corey J. Bohil,et al. Category discriminability, base-rate, and payoff effects in perceptual categorization , 2001, Perception & psychophysics.
[5] E. C. Cmm,et al. on the Recognition of Speech, with , 2008 .
[6] Daniel R. Ilgen,et al. What If Industrial–Organizational Psychology Decided to Take Workplace Decisions Seriously? , 2010, Industrial and Organizational Psychology.
[7] Jerome R. Busemeyer,et al. Judgment and decision-making theory. , 1990 .
[8] Tamara Dinev,et al. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..
[9] John A. Clark,et al. The Human Factor in Mobile Phishing , 2015 .
[10] W. Borman,et al. A Theory of Individual Differences in Task and Contextual Performance , 1997 .
[11] J. Wixted. Dual-process theory and signal-detection theory of recognition memory. , 2007, Psychological review.
[12] L. Beach,et al. A Contingency Model for the Selection of Decision Strategies , 1978 .
[13] Neil A. Macmillan,et al. Detection Theory: A User's Guide , 1991 .
[14] Brenda K. Wiederhold,et al. The Role of Psychology in Enhancing Cybersecurity , 2014, Cyberpsychology Behav. Soc. Netw..
[15] J. Swets,et al. A decision-making theory of visual detection. , 1954, Psychological review.
[16] M. Kubovy,et al. Probability matching and the formation of conservative decision rules in a numerical analog of signal detection. , 1981 .
[17] Robert Willison,et al. Understanding the perpetration of employee computer crime in the organisational context , 2006, Inf. Organ..
[18] Richard G. Gardner,et al. The Five-factor Model of Personality Traits and Organizational Citizenship Behaviors: a Meta-analysis Unresolved Issues regarding Citizenship and Personality , 2022 .
[19] W. Borman,et al. Expanding the Criterion Domain to Include Elements of Contextual Performance , 1993 .
[20] A. Tversky,et al. Judgment under Uncertainty , 1982 .
[21] R. Dalal. A meta-analysis of the relationship between organizational citizenship behavior and counterproductive work behavior. , 2005, The Journal of applied psychology.
[22] Norman H. Anderson,et al. Empirical Direction in Design and Analysis , 2001 .
[23] Ali Darwish,et al. Towards understanding phishing victims' profile , 2012, 2012 International Conference on Computer Systems and Industrial Informatics.
[24] Philip H. Siegel,et al. A signal detection theory approach to analyzing the efficiency and effectiveness of auditing to detect management fraud , 1998 .
[25] Edward M. Baker,et al. Theoretical note: Use of signal detection theory to clarify problems of evaluating performance in industry , 1975 .
[26] L B Lusted,et al. Signal detectability and medical decision-making. , 1971, Science.
[27] Arun Vishwanath,et al. Examining the Distinct Antecedents of E-Mail Habits and its Influence on the Outcomes of a Phishing Attack , 2015, J. Comput. Mediat. Commun..
[28] F. Schmidt,et al. The validity and utility of selection methods in personnel psychology: Practical and theoretical implications of 85 years of research findings. , 1998 .
[29] Naomi M. Kenner,et al. Low target prevalence is a stubborn source of errors in visual search tasks. , 2007, Journal of experimental psychology. General.
[30] R. Lord. Accuracy in behavioral measurement: An alternative definition based on raters' cognitive schema and signal detection theory. , 1985 .
[31] Jason Hong,et al. The state of phishing attacks , 2012, Commun. ACM.
[32] Bradley K. Jensen,et al. Analysis of Student Vulnerabilities to Phishing , 2008, AMCIS.
[33] H Stanislaw,et al. Calculation of signal detection theory measures , 1999, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[34] Jess Marcum,et al. A statistical theory of target detection by pulsed radar , 1948, IRE Trans. Inf. Theory.
[35] R D Sorkin,et al. Spreadsheet signal detection , 1999, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[36] Lisa Feldman Barrett,et al. “Utilizing” Signal Detection Theory , 2014, Psychological science.
[37] D. Kahneman. Thinking, Fast and Slow , 2011 .
[38] Ken H. Guo. Security-related behavior in using information systems in the workplace: A review and synthesis , 2013, Comput. Secur..
[39] Richard N. Landers,et al. An Inconvenient Truth: Arbitrary Distinctions Between Organizational, Mechanical Turk, and Other Convenience Samples , 2015, Industrial and Organizational Psychology.
[40] Chockalingam Viswesvaran,et al. Perspectives on Models of Job Performance , 2000 .
[41] J. Stillman,et al. A detection theory approach to the evaluation of assessors in assessment centres , 2005 .
[42] Ira S. Winkler,et al. Information Security Technology? Don't Rely on It. A Case Study in Social Engineering , 1995, USENIX Security Symposium.
[43] Angela M. Pazzaglia,et al. A critical comparison of discrete-state and continuous models of recognition memory: implications for recognition and beyond. , 2013, Psychological bulletin.
[44] Reeshad S. Dalal,et al. Improving Cybersecurity Incident Response Team Effectiveness Using Teams-Based Research , 2015, IEEE Security & Privacy.
[45] Karl Z Nadolsky. It's what's on the inside that counts , 2017, Obesity.
[46] Reeshad S. Dalal,et al. An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams , 2014, IEEE Security & Privacy.
[47] Filip Lievens,et al. Can training improve the quality of inferences made by raters in competency modeling? A quasi-experiment. , 2007, The Journal of applied psychology.
[48] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[49] D. Dorfman,et al. Maximum-likelihood estimation of parameters of signal-detection theory and determination of confidence intervals—Rating-method data , 1969 .