Developing a User Profile to Predict Phishing Susceptibility and Security Technology Acceptance |
|
Understanding the 'H' in Science of Security HCI Research: Methods and Lessons Learned from Investigations of Phishing |
|
All Signals Go: Investigating How Individual Differences Affect Performance on a Medical Diagnosis Task Designed... |
|
Exploring Expert and Novice Mental Models of Phishing |
|
The social engineering behind phishing. |
|
The social engineering behind phishing. |
|
The social engineering behind phishing. |
|
The social engineering behind phishing. |
|
Mayhorn_Murphy-Hill_Zielinska_Welk_in_press.pdf |
|
Mayhorn, Murphy-Hill, Zielinska, & Welk (in press).pdf |
|
Mayhorn, Welk, Zielinska, & Murphy-Hill (2015).pdf |
|
Zielinska, Welk, Mayhorn, & Murphy-Hill (2015).pdf |
|
Mayhorn_Welk_Zielinska_Murphy-Hill_2015.pdf |
|
Mayhorn_Murphy-Hill_Zielinska_Welk_in_press.pdf |
|
Zielinska_Welk_Mayhorn_Murphy-Hill_2015.pdf |
|
Phisher_men_decision.pdf |
|
Journal_of_CyberBehavior_Submission_07_29_15.docx |
|
Journal of CyberBehavior Submission 07_29_15.docx |
|
Journal_of_CyberBehavior_Submission_07_29_15.docx |
|
Journal_of_CyberBehavior_Submission_07_29_15.docx |
|