Why do users trust the wrong messages? A behavioural model of phishing
暂无分享,去创建一个
[1] Nicolas Christin,et al. Predicted and Observed User Behavior in the Weakest-link Security Game , 2008, UPSEC.
[2] Vijay Varadharajan,et al. Trust and authorization in the grid: a recommendation model , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[3] Paul A. Watters,et al. Trustworthy e-mail using secure XML Web services , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[4] I R Bell,et al. Increased limbic system symptomatology and sensitizability of young adults with chemical and noise sensitivities. , 1995, Environmental research.
[5] Vijay Varadharajan,et al. A Trust based Access Control Framework for P2P File-Sharing Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[6] D. C. Wood. Habituation in Stentor: produced by mechanoreceptor channel modification , 1988, The Journal of neuroscience : the official journal of the Society for Neuroscience.
[7] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[8] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[9] H V Peeke,et al. Stimulus specificity of habituated aggression in the stickleback (Gasterosteus aculeatus). , 1973, Behavioral biology.
[10] P. Watters,et al. Current Research in Social Psychology Social Processes as Dynamical Processes: Qualitative Dynamical Systems Theory in Social Psychology* , 1996 .
[11] J. Wooders,et al. Reputation in Auctions: Theory, and Evidence from Ebay , 2006 .
[12] S. Link,et al. A sequential theory of psychological discrimination , 1975 .
[13] M. Davis,et al. A primary acoustic startle circuit: lesion and stimulation studies , 1982, The Journal of neuroscience : the official journal of the Society for Neuroscience.
[14] John E. R. Staddon,et al. MULTIPLE TIME SCALES IN SIMPLE HABITUATION , 1996 .
[15] F. Craik,et al. Levels of Pro-cessing: A Framework for Memory Research , 1975 .
[16] Paul A. Watters,et al. The Efficiency of Periodic Rekeying in Dynamic Group Key Management , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).
[17] Alex Ng,et al. Forensic Characteristics of Phishing - Petty Theft or Organized Crime? , 2008, WEBIST.