Security awareness of computer users: A phishing threat avoidance perspective NAG Arachchilage, S Love Computers in human behavior 38, 304-312, 2014 | 476 | 2014 |
Defending against phishing attacks: taxonomy of methods, current issues and future directions BB Gupta, NAG Arachchilage, KE Psannis Telecommunication Systems 67, 247-267, 2018 | 355 | 2018 |
A critical review of theories and models of technology adoption and acceptance in information system research A Tarhini, NAG Arachchilage, MS Abbasi International Journal of Technology Diffusion (IJTD) 6 (4), 58-77, 2015 | 280 | 2015 |
A game design framework for avoiding phishing attacks NAG Arachchilage, S Love Computers in Human Behavior 29 (3), 706-714, 2013 | 266 | 2013 |
Phishing threat avoidance behaviour: An empirical investigation NAG Arachchilage, S Love, K Beznosov Computers in Human Behavior 60, 185-197, 2016 | 251 | 2016 |
Why developers cannot embed privacy into software systems? An empirical investigation A Senarath, NAG Arachchilage ACM 22nd International Conference on Evaluation and Assessment in Software …, 2018 | 104 | 2018 |
On the Impact of Touch ID on iPhone Passcodes I Cherapau, I Muslukhov, NAG Arachchilage, K Beznosov The 11th Symposium on Usable Privacy and Security (SOUPS), USENIX, 257-276, 2015 | 102 | 2015 |
Design a mobile game for home computer users to prevent from “phishing attacks” NAG Arachchilage, M Cole International conference on information society (i-society 2011), 485-489, 2011 | 74 | 2011 |
Will they use it or not? Investigating Software Developers’ intention to follow Privacy Engineering Methodologies A Senarath, M Grobler, NAG Arachchilage ACM Transactions on Privacy and Security (TOPS), 2019 | 53 | 2019 |
Designing a mobile game to teach conceptual knowledge of avoiding'phishing attacks' N Arachchilage, S Love, M Scott International Journal for e-Learning Security 2 (1), 127-132, 2012 | 46 | 2012 |
A conceptual model for the organizational adoption of information system security innovations MA Hameed, NAG Arachchilage Security, Privacy, and Forensics Issues in Big Data, 317-339, 2020 | 41 | 2020 |
I'm all Ears! Listening to Software Developers on Putting GDPR Principles into Software Development Practice A Alhazmi, NAG Arachchilage Personal and Ubiquitous Computing, 19, 2021 | 38 | 2021 |
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks G Misra, NAG Arachchilage, S Berkovsky International Symposium on Human Aspects of Information Security & Assurance …, 2017 | 37 | 2017 |
Understanding user privacy expectations: A software developer’s perspective AR Senarath, NAG Arachchilage Telematics and Informatics 35 (7), 1845-1862, 2018 | 35 | 2018 |
Why Johnny Can't Store Passwords Securely?: A Usability Evaluation of Bouncycastle Password Hashing C Wijayarathna, NAG Arachchilage ACM the 22nd International Conference on Evaluation and Assessment in …, 2018 | 35 | 2018 |
A generic cognitive dimensions questionnaire to evaluate the usability of security APIs C Wijayarathna, NAG Arachchilage, J Slay Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017 | 34 | 2017 |
A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective MA Hameed, NAG Arachchilage 27th Australasian Conference on Information Systems (ACIS), 2016 | 31 | 2016 |
Building confidence not to be phished through a gamified approach: conceptualising user's self-efficacy in phishing threat avoidance behaviour G Baral, NAG Arachchilage 2019 cybersecurity and cyberforensics conference (CCC), 102-110, 2019 | 30 | 2019 |
Why Johnny can’t develop a secure application? A usability analysis of Java Secure Socket Extension API C Wijayarathna, NAG Arachchilage Computers & Security 80, 54-73, 2019 | 30 | 2019 |
A data minimization model for embedding privacy into software systems A Senarath, NAG Arachchilage Computers & Security 87, 101605, 2019 | 29 | 2019 |