Sciweavers

17 search results - page 1 / 4
» Behavioral response to phishing risk
Sort
View
ECRIME
2007
13 years 9 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
SEC
2007
13 years 6 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 5 months ago
Selfish Response to Epidemic Propagation
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the ...
George Theodorakopoulos, Jean-Yves Le Boudec, John...
ISDA
2005
IEEE
13 years 10 months ago
Agent-oriented Design for Network Survivability
Intelligent behavior is the selection of actions based on knowledge. The design of the Fuzzy Adaptive Survivability Tool (FAST) agents and their intelligent behavior is explained....
Mehdi Shajari, Ali A. Ghorbani
EOR
2007
272views more  EOR 2007»
13 years 5 months ago
A dynamic logistics coordination model for evacuation and support in disaster response activities
This paper describes an integrated location-distribution model for coordinating logistics support and evacuation operations in disaster response activities. Logistics planning in ...
Wei Yi, Linet Özdamar