A CROSS-CULTURAL AND GENDER-BASED PERSPECTIVE FOR ONLINE SECURITY : EXPLORING KNOWLEDGE , SKILLS AND ATTITUDES OF HIGHER EDUCATION STUDENTS
暂无分享,去创建一个
Stylianos Mystakidis | Eleni Berki | Juri Valtanen | Linfeng Li | Sunil Chaudhary | Eleni Berki | Juri Valtanen | Yan Zhao | Sunil Chaudhary | Yan Zhao | Linfeng Li | S. Mystakidis
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] Ralph W. Tyler,et al. Basic Principles of Curriculum and Instruction , 1969 .
[3] Sydney Gregory,et al. Culture's consequences: international differences in work-related values , 1982 .
[4] E. Keller. Reflections on Gender and Science , 1985 .
[5] R. Harries. Security and society: reflections on law, order and politics , 1988 .
[6] J. Biggs. Enhancing teaching through constructive alignment , 1996 .
[7] C. V. Ford. Lies! Lies!! Lies!!!: The Psychology of Deceit , 1996 .
[8] Detmar W. Straub,et al. Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..
[9] E. Karvonen. Informational societies : understanding the third Industrial Revolution , 2001 .
[10] Marko Helenius,et al. A System to Support the Analysis of Antivirus Products' Virus Detection Capabilities , 2002 .
[11] Helen Nissenbaum,et al. Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.
[12] R. Nisbett. The geography of thought : how Asians and Westerners think differently--and why , 2003 .
[13] Alison Adam,et al. A Decade of Neglect: Reflecting on Gender and IS , 2004 .
[14] Cher Ping,et al. Motivating students to learn , 2005, Br. J. Educ. Technol..
[15] M Kalantzis,et al. The conditions of learning , 2005 .
[16] Eleni Berki,et al. GLOBAL SOFTWARE DEVELOPMENT: THE DIMENSION OF CULTURE , 2005 .
[17] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[18] Eleni Berki,et al. Critical and Creative Mathematical Thinking with Practical Problem Solving Skills-A New Old Challenge , 2007 .
[19] Lorrie Faith Cranor,et al. School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.
[20] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[21] Lorrie Faith Cranor,et al. Teaching Johnny not to fall for phish , 2010, TOIT.
[22] Ugiomo S. Odaro,et al. Social Engineering : Phishing for a Solution , 2011 .
[23] Sunil Chaudhary,et al. Recognition of phishing attacks utilizing anomalies in phishing websites , 2012 .
[24] A. Economides,et al. ADAPTIVE LEARNING : MAPPING PERSONALITY TYPES TO LEARNING STYLES , 2012 .
[25] M. Angela Sasse,et al. Security Education against Phishing: A Modest Proposal for a Major Rethink , 2012, IEEE Security & Privacy.
[26] Nasir Memon,et al. A pilot study of cyber security and privacy related behavior and personality traits , 2013, WWW.
[27] Linfeng Li. A Contingency Framework to Assure the User-Centered Quality and to Support the Design of Anti-Phishing Software , 2013 .
[28] P. W. Singer,et al. Cybersecurity and Cyberwar: What Everyone Needs to Know® , 2013 .
[29] Eleni Berki,et al. Communities, Communication, and Online Identities , 2014 .
[30] Eleni Berki,et al. Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate? , 2014, Behav. Inf. Technol..
[31] Howard A. Schmidt,et al. Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family , 2014 .
[32] Eleni Berki,et al. Time Up for Phishing with Effective Anti-Phishing Research Strategies , 2015, Int. J. Hum. Cap. Inf. Technol. Prof..
[33] Michelle Cheatham,et al. Privacy in the age of big data , 2015, 2015 International Conference on Collaboration Technologies and Systems (CTS).