Usability, security and trust in password managers: A quest for user-centric properties and features S Chaudhary, T Schafeitel-Tähtinen, M Helenius, E Berki Computer Science Review 33, 69-90, 2019 | 58 | 2019 |
Developing metrics to assess the effectiveness of cybersecurity awareness program S Chaudhary, V Gkioulos, S Katsikas Journal of Cybersecurity 8 (1), tyac006, 2022 | 39 | 2022 |
The Use of Usable Security and Security Education to Fight Phishing Attacks S Chaudhary Tampere University Press, 2016 | 24 | 2016 |
A CROSS-CULTURAL AND GENDER-BASED PERSPECTIVE FOR ONLINE SECURITY: EXPLORING KNOWLEDGE, SKILLS AND ATTITUDES OF HIGHER EDUCATION STUDENTS. S Chaudhary, Y Zhao, E Berki, J Valtanen, L Li, M Helenius, S Mystakidis IADIS International Journal on WWW/Internet 13 (1), 2015 | 22 | 2015 |
Time up for phishing with effective anti-phishing research strategies S Chaudhary, E Berki, L Li, J Valtanen International Journal of Human Capital and Information Technology …, 2015 | 17 | 2015 |
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises S Chaudhary, V Gkioulos, S Katsikas Computer Science Review 50, 100592, 2023 | 16 | 2023 |
The Need for Multi-Disciplinary Approaches and Multi-Level Knowledge for Cybersecurity Professionals E Berki, J Valtanen, S Chaudhary, L Li Multidisciplinary Perspectives on Human Capital and Information Technology …, 2018 | 11 | 2018 |
Recognition of phishing attacks utilizing anomalies in phishing websites S Chaudhary Tampere University Press, 2012 | 10 | 2012 |
Properties for Cybersecurity Awareness Posters’ Design and Quality Assessment S Chaudhary, M Kompara, S Pape, V Gkioulos 17th International Conference on Availability, Reliability and Security …, 2022 | 9 | 2022 |
Challenges in Designing Usable Anti-Phishing Solutions S Chaudhary, E Berki Software Quality Management (SQM) XXI: Quality Comes of Age 21, 189-200, 2013 | 9 | 2013 |
Rapid migration from traditional or hybrid to fully virtual education in the age of the coronavirus pandemic: challenges, experiences and views of college and university students E Georgiadou, G Lampropoulos, E Siakas, KV Siakas, JA Edwards, ... | 7* | 2021 |
A socio-cognitive and computational model for decision making and user modelling in social phishing S Chaudhary, E Berki, L Li, J Valtanen, M Helenius Proceedings of Achieving Software Quality in Development and in Use. The …, 2017 | 7 | 2017 |
A Comparative Study of Cyber-Security Knowledge in Higher Education Institutes of Five Countries E Berki, C Kandel, Y Zhao, S Chaudhary EDULEARN17 Proceedings, 2796-2806, 2017 | 7 | 2017 |
Driving Behaviour Change with Cybersecurity Awareness S Chaudhary Computers & Security, 103858, 2024 | 3 | 2024 |
Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources S Chaudhary, V Gkioulos, D Goodman Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022 …, 2023 | 3 | 2023 |
Guidelines for Enhancement of Societal Security Awareness S Chaudhary, S Pape, M Kompara, G Kavallieratos, V Gkioulos https://cybersec4europe.eu/wp-content/uploads/2022/04/D3.19-Guidelines-for …, 2022 | 3* | 2022 |
A comparative study of cloud services use by prospective IT professionals in five countries CS Kandel, E Berki, Y Zhao, S Chaudhary, M Ross, G Staples BCS 1 (25), 175-187, 2017 | 3 | 2017 |
Towards a conceptual framework for privacy protection in the use of interactive 360° video surveillance S Chaudhary, E Berki, P Nykänen, Y Zolotavkin, M Helenius, J Kela 2016 22nd International Conference on Virtual System & Multimedia (VSMM), 1-10, 2016 | 3 | 2016 |
Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution S Chaudhary, L Li, E Berki, M Helenius, J Kela, M Turunen Formal Methods for Industrial Critical Systems: 20th International Workshop …, 2015 | 3 | 2015 |
Increasing Social Awareness through Software Quality and Social Computing – Towards Effective Anti-Phishing Research Strategies E Berki, S Chaudhary, L Li, J Valtanen Software Quality Management (SQM) XXII: Software Quality in Flexible …, 2014 | 3 | 2014 |