Phishing IQ Tests Measure Fear, Not Ability, Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, pp.362-66, 2007. ,
DOI : 10.1007/978-3-540-77366-5_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.987
Global Phishing Survey: Trends and Domain Name Use in 2H2009 Available from: <http://www.antiphishing, 2010. ,
Decision strategies and susceptibility to phishing, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.79-90, 2006. ,
DOI : 10.1145/1143120.1143131
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.8084
Behavioral response to phishing risk, Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on , eCrime '07, pp.37-44, 2007. ,
DOI : 10.1145/1299015.1299019
URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1044&context=isr
Cognitive Reflection and Decision Making, Journal of Economic Perspectives, vol.19, issue.4, pp.25-42, 2005. ,
DOI : 10.1257/089533005775196732
Phishing: can we spot the signs? Computer Fraud & Security, pp.10-15, 2007. ,
DOI : 10.1016/s1361-3723(07)70035-0
Security beliefs and barriers for novice Internet users, Computers & Security, vol.27, issue.7-8, pp.235-275, 2008. ,
DOI : 10.1016/j.cose.2008.01.001
Signal Detection Theory and Psychophysics, 1966. ,
Why Johnny can't surf (safely)? Attacks and defenses for web users, Computers & Security, vol.28, issue.1-2, pp.63-71, 2009. ,
DOI : 10.1016/j.cose.2008.09.007
Social phishing, Communications of the ACM, vol.50, issue.10, pp.94-100, 2007. ,
DOI : 10.1145/1290958.1290968
The Big Five Inventory--Versions 4a and 54, 1991. ,
Paradigm shift to the integrative big-five trait taxonomy: History, measurement, and conceptual issues Handbook of personality: Theory and research, pp.114-58, 2008. ,
The big-five trait taxonomy: History, measurement, and theoretical perspectives, Handbook of personality: Theory and research, pp.102-141, 1999. ,
Getting users to pay attention to anti-phishing education, Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on , eCrime '07, pp.70-81, 2007. ,
DOI : 10.1145/1299015.1299022
An empirical analysis of the current state of phishing attack and defence, Proceedings of the Sixth Workshop on the Economics of Information Security, pp.1-20, 2007. ,
Human Factors and Information Security: Individual, Culture and Security Environment, 2010. ,
Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions, Proceedings of the 28 th International Conference on Human Factors in Computing Systems, pp.373-82, 2010. ,
Calculation of signal detection theory measures, Behavior Research Methods, Instruments, & Computers, vol.83, issue.1, pp.137-186, 1999. ,
DOI : 10.3758/BF03207704
The psychology of password management: a tradeoff between security and convenience, Behaviour & Information Technology, vol.29, issue.3, pp.233-277, 2010. ,
DOI : 10.1080/01449290903121386
The framing of decisions and the psychology of choice, Science, vol.185, pp.453-58, 1981. ,