[ Publications about 'phishing' ]
Articles in journals or book chapters (4) |
-
Anne C. Tally,
Jacob Abbott,
Ashley Bochner,
Sanchari Das,
and Christena Nippert-Eng.
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions.
Proc. ACM Hum.-Comput. Interact.,
7(CSCW1),
April 2023.
Keywords: anti-phishing training, work context, organizations, user studies, IT departments, workplace, phishing, human factors, anti-phishing policy, security, organizational security. [bibtex-entry] -
Sanchari Das,
Christena Nippert-Eng,
and L Jean Camp.
Evaluating user susceptibility to phishing attacks.
Information & Computer Security,
30(1):1--18,
2022.
Keywords: phishing, user studies. [bibtex-entry] -
Zheng Dong,
Apu Kapadia,
and L. Jean Camp.
Pinning & binning: Real time classification of certificates.
December 2013.
Keywords: Phishing, Network Engineering. [bibtex-entry] -
Alla Genkina and L. Jean Camp.
Social networks.
Phishing and countermeasures: Understanding the increasing problem of electronic identity theft, M. Jakobsson and S. Myers, Eds. Hoboken: John Wiley & Sons,
pp 523--550,
2007.
Note: Wiley Online Library.
Keywords: Phishing. [bibtex-entry]
Conference publications (7) |
-
Anne Clara Tally,
Jacob Abbott,
Ashley M Bochner,
Sanchari Das,
and Christena Nippert-Eng.
Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees’ Current Practices.
In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems,
CHI '23,
New York, NY, USA,
2023.
Association for Computing Machinery.
Keywords: phishing education, cybersecurity, informal learning, guerrilla learning, phishing, workplace, anti-phishing training, organizations, IT departments, security, work context, organizational security, qualitative user studies, human factors. [bibtex-entry] -
Vafa Andalibi,
Erfan Sadeqi Azer,
and L Jean Camp.
Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures.
In Proceedings of the 55th Hawaii International Conference on System Sciences,
2022.
Keywords: phishing, user studies, global resilience. [bibtex-entry] -
Shakthidhar Gopavaram,
Jayati Dev,
Marthie Grobler,
DongInn Kim,
Sanchari Das,
and L Jean Camp.
Cross-National Study on Phishing Resilience.
In Proceedings of the Workshop on Usable Security and Privacy (USEC),
May 2021.
Keywords: Phishing. [bibtex-entry] -
Sanchari Das,
Jacob Abbott,
Shakthidhar Gopavaram,
Jim Blythe,
and L Jean Camp.
User-Centered Risk Communication for Safer Browsing.
In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security,
2020.
Keywords: Phishing, Risk Communication, Privacy, Security. [bibtex-entry] -
Zheng Dong,
Apu Kapadia,
Jim Blythe,
and L. Jean Camp.
Beyond the lock icon: real-time detection of phishing websites using public key certificates.
In Electronic Crime Research (eCrime), 2015 APWG Symposium on,
pages 1--12,
May 2015.
IEEE.
Keywords: Phishing, E-Crime. [bibtex-entry] -
Zheng Dong,
Kevin Kane,
and L. Jean Camp.
Phishing in Smooth Waters: The State of Banking Certificates in the US.
In 2014 TPRC Conference Paper,
2014.
Keywords: Phishing, E-Crime. [bibtex-entry]
Posters and Presentations (3) |
-
DongInn Kim and L Jean Camp.
Block-Pi: Defending against Man In The Middle (MITM) Attacks at the Edge.
Society for Risk Analysis, SRA 2019, Buffalo NY,
June 2019.
Keywords: Phishing. [bibtex-entry] -
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
eCrime APWG 2018, Sandiego CA,
May 2018.
Keywords: Phishing. [bibtex-entry] -
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
Midwest Security Workshop 2018, Washington DC,
April 2018.
Keywords: Phishing. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House