From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources., , , , и . Telematics Informatics, (2019)Correlates of Mono- and Dual-Victims of Cybergrooming and Cyberbullying: Evidence from Four Countries., , , , , и . Cyberpsychology Behav. Soc. Netw., 21 (2): 91-98 (2018)Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention., , , и . SG-CRC, том 14 из Cryptology and Information Security Series, стр. 107-114. IOS Press, (2016)Ransomware Economics: A Two-Step Approach To Model Ransom Paid., , , , , , и . eCrime, стр. 1-13. IEEE, (2023)How effective are social engineering interventions? A meta-analysis., и . Inf. Comput. Secur., 28 (5): 801-830 (2020)Priming and warnings are not effective to prevent social engineering attacks., , и . Comput. Hum. Behav., (2017)Victim Routine Influences the Number of DDoS Attacks: Evidence from Dutch Educational Network., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 242-247. IEEE, (2019)A Note on Analysing the Attacker Aims Behind DDoS Attacks., , , и . IDC, том 868 из Studies in Computational Intelligence, стр. 255-265. Springer, (2019)The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains., , , и . Comput. Secur., (мая 2023)Applying the Lost-Letter Technique to Assess IT Risk Behaviour., , , и . STAST, стр. 2-9. IEEE Computer Society, (2013)