Zobrazeno 1 - 10
of 58
pro vyhledávání: '"Pattinson, Malcolm"'
Publikováno v:
Information & Computer Security, 2024, Vol. 32, Issue 4, pp. 477-491.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-11-2023-0222
We examined the influence of three social engineering strategies on users' judgments of how safe it is to click on a link in an email. The three strategies examined were authority, scarcity and social proof, and the emails were either genuine, phishi
Externí odkaz:
http://arxiv.org/abs/1606.00887
Autor:
Parsons, Kathryn, Butavicius, Marcus, Pattinson, Malcolm, Calic, Dragana, Mccormac, Agata, Jerram, Cate
This paper examines the cues that typically differentiate phishing emails from genuine emails. The research is conducted in two stages. In the first stage, we identify the cues that actually differentiate between phishing and genuine emails. These ar
Externí odkaz:
http://arxiv.org/abs/1605.04717
Autor:
Pattinson, Malcolm, Butavicius, Marcus, Lillie, Meredith, Ciccarello, Beau, Parsons, Kathryn, Calic, Dragana, McCormac, Agata
Publikováno v:
Information & Computer Security, 2019, Vol. 28, Issue 1, pp. 1-14.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-01-2019-0022
Autor:
Butavicius, Marcus, Parsons, Kathryn, Lillie, Meredith, McCormac, Agata, Pattinson, Malcolm, Calic, Dragana
Publikováno v:
In Computers & Security November 2020 98
Autor:
McCormac, Agata, Calic, Dragana, Parsons, Kathryn, Butavicius, Marcus, Pattinson, Malcolm, Lillie, Meredith
Publikováno v:
Information & Computer Security, 2018, Vol. 26, Issue 3, pp. 277-289.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-03-2018-0032
Autor:
Parsons, Kathryn *, Calic, Dragana, Pattinson, Malcolm, Butavicius, Marcus, McCormac, Agata, Zwaans, Tara
Publikováno v:
In Computers & Security May 2017 66:40-51
Autor:
McCormac, Agata, Zwaans, Tara, Parsons, Kathryn, Calic, Dragana, Butavicius, Marcus, Pattinson, Malcolm
Publikováno v:
In Computers in Human Behavior April 2017 69:151-156
Publikováno v:
Information & Computer Security, 2017, Vol. 25, Issue 2, pp. 181-189.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-03-2017-0017
Publikováno v:
Information & Computer Security, 2016, Vol. 24, Issue 2, pp. 228-240.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-01-2016-0009