Subject
Law,General Computer Science
Reference175 articles.
1. User preference of cyber security awareness delivery methods;Abawajy;Behav. Inf. Technol.,2014
2. Exploring the effectiveness of information security training and persuasive messages;Abraham,2012
3. Evaluating the effectiveness of learner controlled information security training;Abraham;Comput. Secur.,2019
4. A phishing mitigation solution using human behaviour and emotions that influence the success of phishing attacks;Abroshan,2021
5. Cybersecurity skills training: an attacker-centric gamified approach;Adams;Technol. Innov. Manag..Rev.,2015
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献