Author:
Zhang Roger,Bello Abubakar,Foster Jeffrey L.
Publisher
Springer International Publishing
Reference32 articles.
1. Babbie, E.R.: The Practice of Social Research, vol. 112. Wadsworth Publishing Company Belmont, CA (1998)
2. Bago, B., De Neys, W.: Fast logic?: examining the time course assumption of dual process theory. Cognition 158, 90–109 (2017)
3. Biswas, K., Muthukkumarasamy, V.: Quantitative research design to evaluate learning platforms and learning methods for cyber-security courses. Paper presented at the 28th Annual 2017 Conference of the Australasian Association for Engineering Education (2017)
4. Bullee, J.-W., Montoya, L., Junger, M., Hartel, P.: Spear phishing in organisations explained. Inf. Comput. Secur. 25(5), 593–613 (2017). https://doi.org/10.1108/ICS-03-2017-0009
5. Das, A., Khan, H.U.: Security behaviors of smartphone users. Inf. Comput. Secur. 24(1), 116–134 (2016)