최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Indian journal of science and technology, v.12 no.25, 2019년, pp.1 - 9
Ali, Ghassan Ahmed
초록이 없습니다.
James N. Using email interviews in qualitative educa-tional research: Creating space to think and time to talk. International Journal of Qualitative Studies in Education. 2016 29 2 150 https://doi.org/10.1080/09518398.2015.1017848
Gilbert S. AAHESGIT: New thread email. Elect. Comm., personal communication; 1996
Internet crime report [Internet]. [cited 2017]. Available from: https://pdf.ic3.gov/2017_IC3Report.pdf.
Junger M, Montoya L, Overink FJ. Priming and warn-ings are not effective to prevent social engineering attacks. Computers in Human Behavior. 2017 66 75 https://doi.org/10.1016/j.chb.2016.09.012
Thomas J. Individual cyber security: Empowering employ-ees to resist spear phishing to prevent identity theft and ransom ware attacks [Internet]. [cited 2018]. Available from: http://www.ccsenet.org/journal/index.php/ijbm/ article/view/74724. https://doi.org/10.5539/ijbm.v13n6p1
Alsharnouby M, Alaca F, Chiasson S. Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies. 2015 82 69 https://doi.org/10.1016/j.ijhcs.2015.05.005
Dodge RC, Carver C, Ferguson AJ. Phishing for user secu-rity awareness. Computers and Security. 2007 26 1 73 https://doi.org/10.1016/j.cose.2006.10.009
Williams EJ, Polage D. How persuasive is phishing email? The role of authentic design, influence and current events in email judgments. Behaviour and Information Technology. 2019; 38 (2) 184 https://doi.org/10.1080/0144929X.2018.1519599
Hale ML, Gamble RF, Gamble P. Cyber Phishing: A game-based platform for phishing awareness testing. 2015 48th Hawaii International Conference on System Sciences; 2015. 5260 https://doi.org/10.1109/HICSS.2015.670
Bada M, Sasse A. Cyber security awareness campaigns why do they fail to change behaviour? International Conference on Cyber Security for Sustainable Society; 2014. 1-
Mayhorn CB, Nyeste PG. Training users to counteract phishing. Work. 2012; 41 (S1) 3549
Yar M, Steinmetz KF. Cybercrime and society. SAGE Publications Limited; 2006. 185.
Caputo DD, Pfleeger SL, Freeman JD, Johnson ME. Going spear phishing: Exploring embedded training and aware-ness. IEEE Security and Privacy. 2014 12 1 28 https://doi.org/10.1109/MSP.2013.106
Jensen ML, Dinger M, Wright RT, Thatcher JB. Training to mitigate phishing attacks using mindfulness tech-niques. Journal of Management Information Systems. 2017; 34 (2) 597 https://doi.org/10.1080/07421222.2017.1334499
Booker KC, Merriweather L, Campbell-Whatley G. The effects of diversity training on faculty and students’class-room experiences. International Journal for the Scholarship of Teaching and Learning. 2016; 10 (1) 9. https://doi.org/10.20429/ijsotl.2016.100103
Ausubel DP. The acquisition and retention of knowledge: A cognitive view. Springer Science and Business Media; 2012.
Hung IC, Chen NS. Embodied interactive video lectures for improving learning comprehension and retention. Computers and Education. 2018 117 116 https://doi.org/10.1016/j.compedu.2017.10.005
23. Arzi HJ, Ben-Zvi R, Ganiel U. Forgetting versus savings: The many facets of long-term retention. Science Education. 1986; 70 (2) 171. https://doi.org/10.1002/sce.3730700211
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.