ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1811.06624
  4. Cited By
Cybercrime and You: How Criminals Attack and the Human Factors That They
  Seek to Exploit

Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit

15 November 2018
Jason R. C. Nurse
ArXiv (abs)PDFHTML

Papers citing "Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit"

4 / 4 papers shown
Title
The Group Element of Cybercrime: Types, Dynamics, and Criminal
  Operations
The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations
Jason R. C. Nurse
Maria Bada
AILaw
33
17
0
07 Jan 2019
"Privacy is the Boring Bit": User Perceptions and Behaviour in the
  Internet-of-Things
"Privacy is the Boring Bit": User Perceptions and Behaviour in the Internet-of-Things
Meredydd Williams
Jason R. C. Nurse
S. Creese
30
60
0
16 Jul 2018
The Perfect Storm: The Privacy Paradox and the Internet-of-Things
The Perfect Storm: The Privacy Paradox and the Internet-of-Things
Meredydd Williams
Jason R. C. Nurse
S. Creese
PILM
35
55
0
16 Jul 2018
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception
M. Mehrnezhad
Ehsan Toreini
S. F. Shahandashti
Feng Hao
AAML
68
62
0
18 May 2016
1