Author of the publication

A Qualitative Investigation of Bank Employee Experiences of Information Security and Phishing.

, , , , , and . SOUPS, page 115-129. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Milvus: A Purpose-Built Vector Data Management System., , , , , , , , , and 12 other author(s). SIGMOD Conference, page 2614-2627. ACM, (2021)Deep Security Analysis of DCS for Ship's Nuclear Power System based on Improved DEMATEL.. ICCNS, page 103-108. ACM, (2019)Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's Address., , , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 310-323. Springer, (2023)Physiological Indicators for User Trust in Machine Learning with Influence Enhanced Fact-Checking., , , , and . CD-MAKE, volume 11713 of Lecture Notes in Computer Science, page 94-113. Springer, (2019)Development of a Deep Ocean Master-Slave Electric Manipulator Control System., , , , and . ICIRA (2), volume 7102 of Lecture Notes in Computer Science, page 412-419. Springer, (2011)Enhanced trajectory tracking control with active lower bounded stiffness control for cable robot., , , and . ICRA, page 669-674. IEEE, (2010)Salient region detection for phytoplankton microscopic image., , , , and . ICDIP, volume 8878 of SPIE Proceedings, page 88782Q. SPIE, (2013)Study on Traffic Survey in Urban Traffic Planning., and . ITITS, volume 314 of Frontiers in Artificial Intelligence and Applications, page 242-248. IOS Press, (2018)Study on the precipitation temperature index and its application in drought and flood disasters., , , and . Agro-Geoinformatics, page 1-4. IEEE, (2017)A clustering method based on dominance for triangular fuzzy numbers in subjective decision-making.. ICACI, page 148-151. IEEE, (2015)