| Developing a User Profile to Predict Phishing Susceptibility and Security Technology Acceptance |
|
| Understanding the 'H' in Science of Security HCI Research: Methods and Lessons Learned from Investigations of Phishing |
|
| All Signals Go: Investigating How Individual Differences Affect Performance on a Medical Diagnosis Task Designed... |
|
| Exploring Expert and Novice Mental Models of Phishing |
|
| The social engineering behind phishing. |
|
| The social engineering behind phishing. |
|
| The social engineering behind phishing. |
|
| The social engineering behind phishing. |
|
| Mayhorn_Murphy-Hill_Zielinska_Welk_in_press.pdf |
|
| Mayhorn, Murphy-Hill, Zielinska, & Welk (in press).pdf |
|
| Mayhorn, Welk, Zielinska, & Murphy-Hill (2015).pdf |
|
| Zielinska, Welk, Mayhorn, & Murphy-Hill (2015).pdf |
|
| Mayhorn_Welk_Zielinska_Murphy-Hill_2015.pdf |
|
| Mayhorn_Murphy-Hill_Zielinska_Welk_in_press.pdf |
|
| Zielinska_Welk_Mayhorn_Murphy-Hill_2015.pdf |
|
| Phisher_men_decision.pdf |
|
| Journal_of_CyberBehavior_Submission_07_29_15.docx |
|
| Journal of CyberBehavior Submission 07_29_15.docx |
|
| Journal_of_CyberBehavior_Submission_07_29_15.docx |
|
| Journal_of_CyberBehavior_Submission_07_29_15.docx |
|