Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What Message Characteristics Make Social Engineering Successful on Facebook: The Role of Central Route, Peripheral Route, and Perceived Risk.. Information, 10 (6): 211 (2019)A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems.. IEEE Access, (2019)Individual and Interpersonal Factors That Influence Dis-closure of Personal Identifiable Information on Social Net-Working Sites., , and . J. Softw., 17 (5): 168-181 (2022)Social Engineering in Social Networking sites: How Good becomes evil., , , and . PACIS, page 271. (2014)Social engineering in social networking sites: Affect-based model., , , and . ICITST, page 508-515. IEEE, (2013)Inattentional Blindness Factors that Make People Vulnerable to Security Threats in Social Networking Sites.. J. Comput., 14 (3): 184-194 (2019)Measuring Source Credibility of Social Engineering Attackers on Facebook., , and . HICSS, page 3686-3695. IEEE Computer Society, (2016)Susceptibility to Social Engineering in Social Networking Sites: The Case of Facebook., , and . ICIS, Association for Information Systems, (2015)Factors Influencing Players' Susceptibility to Social Engineering in Social Gaming Networks., , and . IEEE Access, (2020)Toward Predicting Susceptibility to Phishing Victimization on Facebook., , and . SCC, page 419-426. IEEE Computer Society, (2016)