Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
psychology
biblio
Mitigating Circumstances in Cybercrime: A Position Paper
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
Media
warning messages
user cyber behaviour
software features
software engineering
Software
social responsibility
pubcrawl170109
psychology
mitigating circumstances
Mental disorders
circumstance mitigation
law aspect
irrational unconscious actions
interrelation analysis
Digital Forensics
Decision Making
cyberspace design
Cyberspace
Cybercrime
cyber psychology
Computer crime
file
Journal_of_CyberBehavior_Submission_07_29_15.docx
Submitted by cmayhorn on Tue, 10/06/2015 - 12:55pm
Human Factors
phishing attacks
psychology
social engineering
biblio
Will the “Phisher-men” Reel you in? Assessing Individual Differences in a Phishing Detection Task
Submitted by cmayhorn on Tue, 10/06/2015 - 12:55pm
Human Factors
phishing attacks
psychology
social engineering
biblio
A model for Human-computer trust: A key contribution for leveraging trustful interactions
Submitted by BrandonB on Thu, 04/30/2015 - 12:29pm
human computer interaction
user trust needs
user perceptions
trustful interaction leveraging
social phenomenon
psychology
participation history
Participation
Interaction design
human-computer trust model
Human-computer trust
human-computer iteration
collaboration
Engagement
Educational institutions
Correlation
Context
Computers
computer-mediated interactions
computer systems
computer science
computer mediated communication
Computational modeling
biblio
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 11:52am
Science of Security
Patterns
taxonomy
software reusability
Software
security patterns
security of data
security knowledge
security
Science of Security
requirements engineering pattern
requirements engineering
psychology
abstraction
patternmining
Pattern recognition
pattern experimentation
object-oriented methods
Natural languages
knowledge reuse
information security guidelines
formal verification
documentation
cognitive psychology
CMU
CMU
biblio
Less is More?: Investigating the Role of Examples in Security Studies Using Analogical Transfer
Submitted by arao on Wed, 09/17/2014 - 5:30pm
Systems Engineering
ACM CCS
Analogical Transfer
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Human Factors
psychology
Science of Security
security
Social Aspects of Security and Privacy
systems engineering
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
ACM CCS
Cyber Security
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
file
Computer Security for the Home User
Submitted by Katie Dey on Wed, 12/19/2012 - 1:31pm. Contributors:
Adele Howe
Indrajit Ray
Zinta Byrne
ABSTRACT
SaTC Posters
Artificial Intelligence
attack graphs
Colorado State University
psychology
security
0905232
SaTC PI Meeting 2012
Academia
Poster
file
Exploring Perceptions of Phishing: The Role of Social Engineering in the Science of Security
Submitted by emerson on Mon, 12/03/2012 - 5:54pm. Contributors:
Christopher B. Mayhorn
Emerson Murphy-Hill
Christopher M. Kelley
Kyung Wha Hong
ABSTRACT
Human Factors
North Carolina State University
Phishing
psychology
Academia
Poster
Posters
Science of Security Community Meeting, Nov '12
Social Engineering
« first
‹ previous
1
2
3
4
5
6