30 results on '"Robert Biddle"'
Search Results
2. Exploring Content Concealment in Email.
3. SoK: Human-centered Phishing Susceptibility.
4. What is Beautiful is Secure.
5. What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility.
6. User Perception of Data Breaches.
7. SoK: Human-Centered Phishing Susceptibility.
8. The influence of textual and verbal word-of-mouth on website usability and visual appeal.
9. From Incident to Insight: Incident Responders and Software Innovation.
10. The Password Life Cycle.
11. Incident response teams in IT operations centers: the T-TOCs model of team functionality.
12. The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity.
13. User-centred authentication feature framework
14. Satisfaction and its correlates in agile software development.
15. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
16. Graphical passwords: Learning from the first twelve years.
17. User Study, Analysis, and Usable Security of Passwords Based on Digital Objects.
18. Abstraction and Activity in Computer-Mediated Music Production.
19. User interface design affects security: patterns in click-based graphical passwords.
20. Video game values: Human-computer interaction and games.
21. Role-Playing Games in Cybercartography: Multiple Perspectives and Critical Thinking.
22. Live Hypernarrative and Cybercartography: You Are Here, Now.
23. Featherweight generic confinement.
24. Scale-free geometry in OO programs.
25. Notes on notes on postmodern programming.
26. Checking ownership and confinement.
27. Simulating multiple inheritance in Java.
28. Java pitfalls for beginners.
29. Teaching programming by teaching principles of reusability.
30. Object Oriented Program Visualisation in Tarraingim.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.