UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4
hits: 35
1.
Full text

PDF
2.
  • Using Semantic Context to R... Using Semantic Context to Rank the Results of Keyword Search
    Butavicius, Marcus A.; Parsons, Kathryn M.; McCormac, Agata ... International journal of human-computer interaction, 05/2019, Volume: 35, Issue: 9
    Journal Article
    Peer reviewed

    In an empirical user study, we assessed two approaches to ranking the results from a keyword search using semantic contextual match based on Latent Semantic Analysis. These techniques involved ...
Full text
3.
  • Determining employee awaren... Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)
    Parsons, Kathryn; McCormac, Agata; Butavicius, Marcus ... Computers & security, 05/2014, Volume: 42
    Journal Article
    Peer reviewed

    It is increasingly acknowledged that many threats to an organisation's computer systems can be attributed to the behaviour of computer users. To quantify these human-based information security ...
Full text
4.
  • Individual differences and ... Individual differences and Information Security Awareness
    McCormac, Agata; Zwaans, Tara; Parsons, Kathryn ... Computers in human behavior, April 2017, 2017-04-00, 20170401, Volume: 69
    Journal Article
    Peer reviewed

    The main purpose of this study was to examine the relationship between individuals' Information Security Awareness (ISA) and individual difference variables, namely age, gender, personality and ...
Full text
5.
  • Predicting susceptibility t... Predicting susceptibility to social influence in phishing emails
    Parsons, Kathryn; Butavicius, Marcus; Delfabbro, Paul ... International journal of human-computer studies, August 2019, 2019-08-00, Volume: 128
    Journal Article
    Peer reviewed

    •A total of 985 participants completed a role play scenario-based phishing study.•The presence of social influence principles influenced phishing susceptibility.•Phishing emails using consistency and ...
Full text
6.
  • Why people keep falling for... Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails
    Butavicius, Marcus; Taib, Ronnie; Han, Simon J. Computers & security, December 2022, 2022-12-00, Volume: 123
    Journal Article
    Peer reviewed

    Lack of personalisation and poor mechanics (e.g., grammar, spelling and punctuation) are commonly cited as cues of deception that people can use to identify phishing emails. However, in an online ...
Full text
7.
  • The Human Aspects of Inform... The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies
    Parsons, Kathryn; Calic, Dragana; Pattinson, Malcolm ... Computers & security, 05/2017, Volume: 66
    Journal Article
    Peer reviewed

    Information security awareness (ISA) is integral to protecting an organisation from cyber threats. The aim of this paper is to further establish the validity of the Human Aspects of Information ...
Full text
8.
  • The sleepless sentinel: fac... The sleepless sentinel: factors that predict burnout and sleep quality in cybersecurity professionals
    Reeves, Andrew; Pattinson, Malcolm; Butavicius, Marcus Information and computer security, 04/2024
    Journal Article
    Peer reviewed

    Purpose The purpose of this study is to investigate the extent to which a sample of the Australian cybersecurity industry is impacted by burnout. Design/methodology/approach Based on the review of ...
Full text
9.
  • An assessment of email and ... An assessment of email and spontaneous dialog visualizations
    Butavicius, Marcus A.; Lee, Michael D.; Pincombe, Brandon M. ... International journal of human-computer studies, 06/2012, Volume: 70, Issue: 6
    Journal Article
    Peer reviewed

    Two experiments were conducted examining the effectiveness of visualizations of unstructured texts. The first experiment presented transcriptions of unrehearsed dialog and the second used emails. ...
Full text
10.
  • Attention to internal face ... Attention to internal face features in unfamiliar face matching
    Fletcher, Kingsley I.; Butavicius, Marcus A.; Lee, Michael D. British journal of psychology, August 2008, Volume: 99, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Accurate matching of unfamiliar faces is vital in security and forensic applications, yet previous research has suggested that humans often perform poorly when matching unfamiliar faces. Hairstyle ...
Full text

PDF
1 2 3 4
hits: 35

Load filters