Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services
|
2021 |
Wilusz, Daniel |
Please Stop Listening While I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration
|
2021 |
Kim, Jongkeon |
The Effectiveness of Video Messaging Campaigns to Use 2FA
|
2021 |
Qahtani, Elham Al |
Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof Schemes
|
2021 |
Leonidou, Pantelitsa |
Human Individual Difference Predictors in Cyber-Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior
|
2021 |
Raywood-Burke, George |
Understanding User’s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account
|
2021 |
Kocabas, Huzeyfe |
CyberPin - Challenges on Recognizing Youngest Cyber Talents
|
2021 |
Lorenz, Birgy |
Social Engineering Attacks: Recent Advances and Challenges
|
2021 |
Mashtalyar, Nikol |
Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal?
|
2021 |
Alam, Aniqa |
Development of a Novice-Friendly Representation of Camouflaged Boolean Networks
|
2021 |
Hamadache, Salsabil |
Identity Recognition Based on the Hierarchical Behavior Characteristics of Network Users
|
2021 |
Wang, Biao |
Beyond Murphy’s Law: Applying Wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience
|
2021 |
Fairburn, Nicola |
A Human Factor Approach to Threat Modeling
|
2021 |
Ferro, Lauren S. |
Privacy Design Strategies and the GDPR: A Systematic Literature Review
|
2021 |
Saltarella, Marco |
Heuristic Evaluation of Vulnerability Risk Management Leaders’ Presentations of Cyber Threat and Cyber Risk
|
2021 |
Nichols, Chris |
Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices
|
2021 |
Al-Ameen, Mahdi Nasrullah |
Perceptions of Security and Privacy in mHealth
|
2021 |
Ferreira, Ana |
It’s Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness
|
2021 |
Pickering, Brian |
Understanding the Last Line of Defense: Human Response to Cybersecurity Events
|
2021 |
Rebensky, Summer |
Gaming Apps’ and Social Media Partnership: A Privacy Perspective
|
2021 |
Wang, Tian |