Author of the publication

Decisions, Decisions: Analysis of Age, Cohort, and Time of Testing on Framing of Risky Decision Options.

, , and . Hum. Factors, 44 (4): 515-521 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The persuasive phish: examining the social psychological principles hidden in phishing emails., , , and . HotSoS, page 126. ACM, (2016)American and Indian Conceptualizations of Phishing., , , , and . STAST, page 37-45. IEEE Computer Society, (2013)A Survey of World Wide Web Use in Middle-Aged and Older Adults., , and . Hum. Factors, 42 (2): 175-182 (2000)Will the "Phisher-Men" Reel You In?: Assessing Individual Differences in a Phishing Detection Task., , , , , and . Int. J. Cyber Behav. Psychol. Learn., 5 (4): 1-17 (2015)Trusting the Internet: Cues Affecting Perceived Credibility., and . Int. J. Technol. Hum. Interact., 4 (1): 75-93 (2008)To download or not to download: an examination of computer security decision making., , and . Interactions, 13 (3): 32-37 (2006)Perceptions of Driver Distraction by Cellular Phone Users and Nonusers., and . Hum. Factors, 47 (2): 455-467 (2005)Persuasive Pillboxes: Improving Medication Adherence with Personal Digital Assistants., and . PERSUASIVE, volume 3962 of Lecture Notes in Computer Science, page 195-198. Springer, (2006)Exploring expert and novice mental models of phishing., , , and . HotSoS, page 22:1-22:2. ACM, (2015)Decisions, Decisions: Analysis of Age, Cohort, and Time of Testing on Framing of Risky Decision Options., , and . Hum. Factors, 44 (4): 515-521 (2002)