[HTML][HTML] Virtual reality for health professions education: systematic review and meta-analysis by the digital health education collaboration

BM Kyaw, N Saxena, P Posadzki, J Vseteckova… - Journal of medical …, 2019 - jmir.org
Background Virtual reality (VR) is a technology that allows the user to explore and
manipulate computer-generated real or artificial three-dimensional multimedia sensory …

Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

” I am Definitely Manipulated, Even When I am Aware of it. It's Ridiculous!”-Dark Patterns from the End-User Perspective

K Bongard-Blanchy, A Rossi, S Rivas… - Proceedings of the …, 2021 - dl.acm.org
Online services pervasively employ manipulative designs (ie, dark patterns) to influence
users to purchase goods and subscriptions, spend more time on-site, or mindlessly accept …

Phishing in organizations: Findings from a large-scale and long-term study

D Lain, K Kostiainen, S Čapkun - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …

Design choices for central bank digital currency: Policy and technical considerations

S Allen, S Čapkun, I Eyal, G Fanti, BA Ford… - 2020 - nber.org
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …

From chatbots to phishbots?: Phishing scam generation in commercial large language models

SS Roy, P Thota, KV Naragam… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The advanced capabilities of Large Language Models (LLMs) have made them invaluable
across various applications, from conversational agents and content creation to data …

A survey of the use of crowdsourcing in software engineering

K Mao, L Capra, M Harman, Y Jia - Journal of Systems and Software, 2017 - Elsevier
The term 'crowdsourcing'was initially introduced in 2006 to describe an emerging distributed
problem-solving model by online workers. Since then it has been widely studied and …

The role of user behaviour in improving cyber security management

AA Moustafa, A Bello, A Maurushat - Frontiers in Psychology, 2021 - frontiersin.org
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …

{“... No} one can hack my {Mind”}: Comparing expert and {Non-Expert} security practices

I Ion, R Reeder, S Consolvo - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …

Control versus effort in privacy warnings for webforms

K Krol, S Preibusch - Proceedings of the 2016 ACM on Workshop on …, 2016 - dl.acm.org
Webforms are the primary way of collecting information online. However, some users may
wish to limit the amount of personal information they provide and only fill out the minimum …