Author of the publication

The persuasive phish: examining the social psychological principles hidden in phishing emails.

, , , and . HotSoS, page 126. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusting the Internet: Cues Affecting Perceived Credibility., and . Int. J. Technol. Hum. Interact., 4 (1): 75-93 (2008)A Survey of World Wide Web Use in Middle-Aged and Older Adults., , and . Hum. Factors, 42 (2): 175-182 (2000)The persuasive phish: examining the social psychological principles hidden in phishing emails., , , and . HotSoS, page 126. ACM, (2016)American and Indian Conceptualizations of Phishing., , , , and . STAST, page 37-45. IEEE Computer Society, (2013)Differences in trust between human and automated decision aids., , , , , , and . HotSoS, page 95-98. ACM, (2016)All signals go: investigating how individual differences affect performance on a medical diagnosis task designed to parallel a signals intelligence analyst task., and . HotSoS, page 10:1-10:5. ACM, (2015)Phishing in international waters: exploring cross-national differences in phishing conceptualizations between Chinese, Indian and American samples., , , , , , and . HotSoS, page 8. ACM, (2014)Persuasive Pillboxes: Improving Medication Adherence with Personal Digital Assistants., and . PERSUASIVE, volume 3962 of Lecture Notes in Computer Science, page 195-198. Springer, (2006)Exploring expert and novice mental models of phishing., , , and . HotSoS, page 22:1-22:2. ACM, (2015)