Author:
Nasser George,Morrison Ben W.,Bayl-Smith Piers,Taib Ronnie,Gayed Michael,Wiggins Mark W.
Subject
Artificial Intelligence,Information Systems,Computer Science (miscellaneous)
Reference54 articles.
1. “Understanding phishing susceptibility: an integrated model of cue-utilization and habits,”
AyaburiE.
Andoh-BaidooF. K.
International Conference on Information Systems 2019 Proceedings2019
2. The relationship between gaze behavior, expertise, and performance: a systematic review;Brams;Psychol. Bullet,2019
3. The role of cue utilisation in reducing the workload in a train control task;Brouwers;Ergonomics,2017
4. “Breaching the human firewall: social engineering in phishing and spear-phishing emails,”;Butavicius,2016
5. Going spear phishing: exploring embedded training and awareness;Caputo;Sec. Privacy IEEE,2014
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献