Author:
Bahrini Mehrdad,Zargham Nima,Pfau Johannes,Lemke Stella,Sohr Karsten,Malaka Rainer
Publisher
Springer International Publishing
Reference70 articles.
1. Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237–248 (2014). https://doi.org/10.1080/0144929X.2012.708787
2. Alotaibi, F., Furnell, S., Stengel, I., Papadaki, M.: A review of using gaming technology for cyber-security awareness. Int. J. Inf. Secur. Res. (IJISR) 6(2), 660–666 (2016)
3. Arachchilage, N.A.G., Love, S., Beznosov, K.: Phishing threat avoidance behaviour: an empirical investigation. Comput. Hum. Behav. 60, 185–197 (2016)
4. Bachy, Y., Nicomette, V., Kaâniche, M., Alata, E.: Smart-tv security: risk analysis and experiments on smart-tv communication channels. J. Comput. Virol. Hack. Tech. 15(1), 61–76 (2019)
5. Baddeley, A.D.: Human Memory: Theory and Practice. Psychology Press, Exeter (1997)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献