Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Akbar Siami Namin
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Do users’ mental models of hackers affect their perceived susceptibility to and the perceived severity of phishing attacks?
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security 1–17.
Published: 10 February 2026
Journal Articles
The effects of persuasion principles on perceived honesty during shoulder surfing attacks
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (2): 267–283.
Published: 08 August 2024
Journal Articles
How do non experts think about cyber attack consequences?
Available to PurchaseKeith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (4): 473–489.
Published: 14 April 2022
Journal Articles
How social engineers use persuasion principles during vishing attacks
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (2): 314–331.
Published: 07 December 2020
