Author:
Jones Keith S.,Lodinger Natalie R.,Widlus Benjamin P.,Namin Akbar Siami,Maw Emily,Armstrong Miriam
Funder
National Science Foundation
Publisher
Springer Science and Business Media LLC
Subject
Human-Computer Interaction,Signal Processing
Reference48 articles.
1. United States Department of Homeland Security (2020) Homeland Threat Assessment. https://www.dhs.gov/sites/default/files/publications/2020_10_06_homeland-threat-assessment.pdf. Accessed 3 March 2021
2. Centers for Disease Control and Prevention (2021) COVID-19 Related Phone Scams and Phishing Attacks. https://www.cdc.gov/media/phishing.html. Accessed 3 March 2021
3. Siami Namin A, Hewett R, Jones KS, Pogrund R(2016) Sonifying internet security threats. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2306–2313. https://doi.org/10.1145/2851581.2892363
4. Alsharnouby M, Alaca F, Chiasson S (2015) Why phishing still works: User strategies for combating phishing attacks. Int J Hum Comput Stud 82:69–82. https://doi.org/10.1016/j.ijhcs.2015.05.005
5. Holman J, Lazar J, Feng J (2008) Investigating the security-related challenges of blind users on the Web. In: Langdon P, Clarkson J, Robinson P (eds) Designing inclusive futures. Springer, London, pp 129–138
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献