Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Cyber security education
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Security questions education: exploring gamified features and functionalities
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (3): 365–378.
Published: 09 July 2018
... Publishing Limited Licensed re-use rights only Usable security Serious games Cyber security education Security questions Fall-back authentication mechanisms are used to recover forgotten passwords. Text-based and email-based fall-back authentication mechanisms have recently been adopted...
Journal Articles
Decoding audience interpretations of awareness campaign messages
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (2): 177–193.
Published: 13 June 2016
... examines one possible theory that could be used as such a measure. 17 01 2016 17 01 2016 09 03 2016 © Emerald Group Publishing Limited 2016 Emerald Group Publishing Limited Licensed re-use rights only Case study Action research Active audience theory Cyber security...
