Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

American and Indian Conceptualizations of Phishing., , , , and . STAST, page 37-45. IEEE Computer Society, (2013)The persuasive phish: examining the social psychological principles hidden in phishing emails., , , and . HotSoS, page 126. ACM, (2016)Will the "Phisher-Men" Reel You In?: Assessing Individual Differences in a Phishing Detection Task., , , , , and . Int. J. Cyber Behav. Psychol. Learn., 5 (4): 1-17 (2015)A Survey of World Wide Web Use in Middle-Aged and Older Adults., , and . Hum. Factors, 42 (2): 175-182 (2000)Trusting the Internet: Cues Affecting Perceived Credibility., and . Int. J. Technol. Hum. Interact., 4 (1): 75-93 (2008)Perceptions of Driver Distraction by Cellular Phone Users and Nonusers., and . Hum. Factors, 47 (2): 455-467 (2005)To download or not to download: an examination of computer security decision making., , and . Interactions, 13 (3): 32-37 (2006)Decisions, Decisions: Analysis of Age, Cohort, and Time of Testing on Framing of Risky Decision Options., , and . Hum. Factors, 44 (4): 515-521 (2002)Differences in trust between human and automated decision aids., , , , , , and . HotSoS, page 95-98. ACM, (2016)All signals go: investigating how individual differences affect performance on a medical diagnosis task designed to parallel a signals intelligence analyst task., and . HotSoS, page 10:1-10:5. ACM, (2015)