Author of the publication

How to Assess Human Visual Performance on an Operational Task.

, , , , and . KES-AMSTA, volume 7327 of Lecture Notes in Computer Science, page 406-413. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails., , , and . CoRR, (2016)Mouse Behavior as an Index of Phishing Awareness., , , , and . INTERACT (1), volume 11746 of Lecture Notes in Computer Science, page 539-548. Springer, (2019)Factors that Influence Information Security Behavior: An Australian Web-Based Study., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 231-241. Springer, (2015)Aligning Cyber-Security Training to Individual Cognitive Style., , , , , , and . HAISA, page 132-142. University of Plymouth, (2019)Improving Infrared Images for Standoff Object Detection., , , and . J. Comput. Inf. Technol., (2010)Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture., , , , , and . HAISA, page 12-23. University of Plymouth, (2017)An assessment of email and spontaneous dialog visualizations., , , , , , and . Int. J. Hum. Comput. Stud., 70 (6): 432-449 (2012)Scenario testing methodology for the assessment of screening technologies., , , , , and . Int. J. Knowl. Learn., 7 (1/2): 25-38 (2011)Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience?, , , , , and . HAISA, page 1-11. University of Plymouth, (2018)Predicting susceptibility to social influence in phishing emails., , , and . Int. J. Hum. Comput. Stud., (2019)