Security Education against Phishing
暂无分享,去创建一个
[1] Cormac Herley,et al. So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.
[2] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[4] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .
[5] Lorrie Faith Cranor,et al. School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.
[6] Lorrie Faith Cranor,et al. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.
[7] Jens Riegelsberger,et al. Rich Media, Poor Judgement? A Study of Media Effects on Users' Trust in Expertise , 2005, BCS HCI.
[8] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[9] Marios Koufaris,et al. The development of initial trust in an online company by new customers , 2004, Inf. Manag..
[10] Jens Riegelsberger,et al. The mechanics of trust: A framework for research and design , 2005, Int. J. Hum. Comput. Stud..
[11] Katrin R. Harich,et al. Brand equity: the halo effect measure , 1995 .
[12] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[13] Frank Stajano,et al. Understanding scam victims , 2011, Commun. ACM.
[14] H. Raghav Rao,et al. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2008, Decis. Support Syst..
[15] Paul Kearney,et al. Human vulnerabilities in security systems , 2007 .