Security Education against Phishing

[1]  Cormac Herley,et al.  So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.

[2]  Stuart E. Schechter,et al.  The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[3]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[4]  Rick Wash,et al.  Organization Interfaces—collaborative computing General Terms , 2022 .

[5]  Lorrie Faith Cranor,et al.  School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.

[6]  Lorrie Faith Cranor,et al.  Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.

[7]  Jens Riegelsberger,et al.  Rich Media, Poor Judgement? A Study of Media Effects on Users' Trust in Expertise , 2005, BCS HCI.

[8]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[9]  Marios Koufaris,et al.  The development of initial trust in an online company by new customers , 2004, Inf. Manag..

[10]  Jens Riegelsberger,et al.  The mechanics of trust: A framework for research and design , 2005, Int. J. Hum. Comput. Stud..

[11]  Katrin R. Harich,et al.  Brand equity: the halo effect measure , 1995 .

[12]  Lorrie Faith Cranor,et al.  You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.

[13]  Frank Stajano,et al.  Understanding scam victims , 2011, Commun. ACM.

[14]  H. Raghav Rao,et al.  A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2008, Decis. Support Syst..

[15]  Paul Kearney,et al.  Human vulnerabilities in security systems , 2007 .