Related references
Note: Only part of the references are listed.Going Spear Phishing: Exploring Embedded Training and Awareness
Deanna D. Caputo et al.
IEEE SECURITY & PRIVACY (2014)
Basing Cybersecurity Training on User Perceptions
Susanne M. Furman et al.
IEEE SECURITY & PRIVACY (2012)
How Effective Is Your Security Awareness Program? An Evaluation Methodology
Konstantinos Rantos et al.
INFORMATION SECURITY JOURNAL (2012)
The cyber threat landscape: Challenges and future research directions
Kim-Kwang Raymond Choo
COMPUTERS & SECURITY (2011)
Clinical Report-The Impact of Social Media on Children, Adolescents, and Families
Gwenn Schurgin O'Keeffe et al.
PEDIATRICS (2011)
Cyber security for home users: A new way of protection through awareness enforcement
E. Kritzinger et al.
COMPUTERS & SECURITY (2010)
Online activities and writing practices of urban Malaysian adolescents
Kok Eng Tan et al.
SYSTEM (2010)
The impact of information richness on information security awareness training effectiveness
R. S. Shaw et al.
COMPUTERS & EDUCATION (2009)
Information security: The moving target
M. T. Dlamini et al.
COMPUTERS & SECURITY (2009)
Information security awareness in higher education: An exploratory study
Yacine Rezgui et al.
COMPUTERS & SECURITY (2008)
Security beliefs and barriers for novice Internet users
Steven Furnell et al.
COMPUTERS & SECURITY (2008)
Improving end user behaviour in password utilization: An action research initiative
Danuvasin Charoen et al.
SYSTEMIC PRACTICE AND ACTION RESEARCH (2008)
Investigating Information Security Awareness: Research and Practice Gaps
Aggeliki Tsohou et al.
INFORMATION SECURITY JOURNAL (2008)
Assessing the security perceptions of personal Internet users
S. M. Furnell et al.
COMPUTERS & SECURITY (2007)
A qualitative study of users' view on information security
Eirik Albrechtsen
COMPUTERS & SECURITY (2007)
Value-focused assessment of ICT security awareness in an academic environment
L. Drevin et al.
COMPUTERS & SECURITY (2007)
A video game for cyber security training and awareness
Benjamin D. Cone et al.
COMPUTERS & SECURITY (2007)
A contextual framework for combating identity theft
WJ Wang et al.
IEEE SECURITY & PRIVACY (2006)
A prototype for assessing information security awareness
H. A. Kruger et al.
COMPUTERS & SECURITY (2006)
Teenagers' perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach
S Youn
JOURNAL OF BROADCASTING & ELECTRONIC MEDIA (2005)
Analysis of end user security behaviors
JM Stanton et al.
COMPUTERS & SECURITY (2005)
A critical analysis of evaluation practice: the Kirkpatrick model and the principle of beneficence
R Bates
EVALUATION AND PROGRAM PLANNING (2004)
Internet addiction:: Characteristics of a questionnaire and prevalence in Norwegian youth (12-18 years)
A Johansson et al.
SCANDINAVIAN JOURNAL OF PSYCHOLOGY (2004)