Issue Date | Title | Author(s) |
2019-01-01 | A qualitative investigation of bank employee experiences of information security and phishing | Conway, D; Taib, R; Harris, M; Berkovsky, S; Yu, K; Chen, F |
2018 | Do I trust a machine? Differences in user trust based on system performance | Yu, K; Berkovsky, S; Conway, D; Taib, R; Zhou, J; Chen, F |
2019-01-01 | Do I trust my machine teammate? An investigation from perception to decision | Yu, K; Berkovsky, S; Taib, R; Zhou, J; Chen, F |
2019-01-01 | Energy Saving Optimisation for Water Distribution Networks | Zhao, Y; Liang, B; Dang, S; Taib, R; Wang, Y; Matthews, G; Chen, F; Hua, T; Doolan, C |
2019-01-01 | Mouse Behavior as an Index of Phishing Awareness | Yu, K; Taib, R; Butavicius, MA; Parsons, K; Chen, F |
2019-01-01 | Optimising Pump Scheduling for Water Distribution Networks | Zhao, Y; Liang, B; Wang, Y; Dang, S; Taib, R; Chen, F; Hua, T; Vitanage, D; Doolan, C |
2019-11-01 | Predicting water quality for the woronora delivery network with sparse samples | Liang, B; Vitanage, D; Doolan, C; Li, Z; Taib, R; Mathews, G; Wang, Y; Lu, S; Chen, F; Hua, T; Peters, A |
2022-01-31 | Response to a phishing attack: persuasion and protection motivation in an organizational context | Bayl-Smith, P; Taib, R; Yu, K; Wiggins, M |
2019-01-01 | Social Engineering and Organisational Dependencies in Phishing Attacks | Taib, R; Yu, K; Berkovsky, S; Wiggins, M; Bayl-Smith, P |