408 results on '"Robert Biddle"'
Search Results
2. A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility.
3. programmingLanguage as Language;.
4. Waste Self-reporting for Software Development Productivity Improvement.
5. Reducing Workload in Using AI-based API REST Test Generation.
6. Exploring Content Concealment in Email.
7. SoK: Human-centered Phishing Susceptibility.
8. Understanding Leadership in Agile Software Development Teams: Who and How?
9. What is Beautiful is Secure.
10. What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility.
11. Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal?
12. Surface Computing and Collaborative Analysis Work
13. Home and Away: UI Design Patterns for Supporting End-User Security.
14. Out of Sight, Out of Mind: UI Design and the Inhibition of Mental Models of Security.
15. We're Here to Help: Company Image Repair and User Perception of Data Breaches.
16. User Perception of Data Breaches.
17. SoK: Human-Centered Phishing Susceptibility.
18. Website Identity Notification: Testing the Simplest Thing That Could Possibly Work.
19. Control and Understanding in Malware and Legitimate Software.
20. Learning with Trees: - A Non-linear E-Textbook Format for Deep Learning.
21. Helping Users Secure Their Data by Supporting Mental Models of VeraCrypt.
22. Myagile: sociological and cultural effects of agile on teams and their members.
23. Hide-and-Seek with Website Identity Information.
24. Satisfaction, Practices, and Influences in Agile Software Development.
25. An exploratory study of children's online password behaviours.
26. Building Website Certificate Mental Models.
27. Stress in Agile Software Development: Practices and Outcomes.
28. Mixed Pictures: Mental Models of Malware.
29. The influence of textual and verbal word-of-mouth on website usability and visual appeal.
30. From Incident to Insight: Incident Responders and Software Innovation.
31. Affective Walkthroughs and Heuristics: Evaluating Minecraft Hour of Code.
32. The Password Life Cycle.
33. Cesar: Visual representation of source code vulnerabilities.
34. Does textual word-of-mouth affect look and feel?
35. Hacking with multi-touch for Java (MT4j).
36. Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends.
37. Agile Practices, Collaboration and Experience - An Empirical Study About the Effect of Experience in Agile Software Development.
38. Teaching Agile Collaboration Skills in the Classroom.
39. MADE Ratio: Affective Multimodal Software for Mathematical Concepts.
40. Evaluating Software for Affective Education: A Case Study of the Affective Walkthrough.
41. Expert Password Management.
42. Choose Your Own Authentication.
43. Collaborative annotations for large touchscreen web Applications.
44. Supporting 'what-if' in touch-screen web Applications.
45. Understanding Digital Cardwall Usage.
46. Incident response teams in IT operations centers: the T-TOCs model of team functionality.
47. The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity.
48. A Password Manager that Doesn't Remember Passwords.
49. The Password Life Cycle: User Behaviour in Managing Passwords.
50. Stop Clicking on 'Update Later': Persuading Users They Need Up-to-Date Antivirus Protection.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.