Nalin A. G. Arachchilage
Orcid: 0000-0001-9192-0993Affiliations:
- University of Auckland, New Zealand
- University of New South Wales, Canberra, ACT, Australia (former)
According to our database1,
Nalin A. G. Arachchilage
authored at least 85 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology.
Int. J. Inf. Sec., August, 2024
Int. J. Inf. Sec., June, 2024
CoRR, 2024
Examining Attacks on Consensus and Incentive Systems in Proof-of-Work Blockchains: A Systematic Literature Review.
CoRR, 2024
SoK: Identifying Limitations and Bridging Gaps of Cybersecurity Capability Maturity Models (CCMMs).
CoRR, 2024
Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions.
CoRR, 2024
SoK: Demystifying Privacy Enhancing Technologies Through the Lens of Software Developers.
CoRR, 2024
Combating Phishing in the Age of Fake News: A Novel Approach with Text-to-Text Transfer Transformer.
Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder, 2024
Proceedings of the 45th International Conference on Information Systems, 2024
2023
CoRR, 2023
CoRR, 2023
What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility.
CoRR, 2023
Proceedings of the 5th World Symposium on Software Engineering, 2023
A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility.
Proceedings of the 35th Australian Computer-Human Interaction Conference, 2023
Proceedings of the 25th Australasian Computing Education Conference, 2023
2022
Developers' Privacy Education: A game framework to stimulate secure coding behaviour.
Proceedings of the IEEE Smartworld, 2022
Demo Abstract: PrivacyCube: A Tangible Device for Improving Privacy Awareness in IoT.
Proceedings of the Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2022
2021
Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails.
Secur. Priv., 2021
Pers. Ubiquitous Comput., 2021
The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment.
Pers. Ubiquitous Comput., 2021
I'm all ears! Listening to software developers on putting GDPR principles into software development practice.
Pers. Ubiquitous Comput., 2021
Software developers need help too! Developing a methodology to analyse cognitive dimension-based feedback on usability.
Behav. Inf. Technol., 2021
Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors.
Proceedings of the 42nd International Conference on Information Systems, 2021
Eye-GUAna: Higher Gaze-Based Entropy and Increased Password Space in Graphical User Authentication Through Gamification.
Proceedings of the 2021 Symposium on Eye Tracking Research and Applications, 2021
Better, Funner, Stronger: A Gameful Approach to Nudge People into Making Less Predictable Graphical Password Choices.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach.
Secur. Priv., 2020
Why are Developers Struggling to Put GDPR into Practice when Developing Privacy-Preserving Software Systems?
CoRR, 2020
Designing a serious game: teaching developers to embed privacy into software systems.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020
Vision: Why Johnny Can't Configure Smart Home? A Behavioural Framework for Smart Home Privacy Configuration.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies.
ACM Trans. Priv. Secur., 2019
Using cognitive dimensions to evaluate the usability of security APIs: An empirical investigation.
Inf. Softw. Technol., 2019
CoRR, 2019
On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations.
CoRR, 2019
Why Johnny can't develop a secure application? A usability analysis of Java Secure Socket Extension API.
Comput. Secur., 2019
Comput. Secur., 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the Evaluation and Assessment on Software Engineering, 2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks?
Proceedings of the Australasian Conference on Information Systems, 2019
2018
Defending against phishing attacks: taxonomy of methods, current issues and future directions.
Telecommun. Syst., 2018
Telematics Informatics, 2018
Inf. Comput. Secur., 2018
Understanding the influence of Individual's Self-efficacy for Information Systems Security Innovation Adoption: A Systematic Literature Review.
CoRR, 2018
CoRR, 2018
Why Johnny Can't Store Passwords Securely?: A Usability Evaluation of Bouncycastle Password Hashing.
Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, 2018
Why developers cannot embed privacy into software systems?: An empirical investigation.
Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, 2018
2017
Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions.
CoRR, 2017
A Conceptual Model for the Organisational Adoption of Information System Security Innovations.
CoRR, 2017
CoRR, 2017
Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions.
Ann. des Télécommunications, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 28th Annual Workshop of the Psychology of Programming Interest Group, 2017
Changing users' security behaviour towards security questions: A game based learning approach.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
Proceedings of the Australasian Conference on Information Systems, 2017
A Model for Enhancing Human Behaviour with Security Questions: A Theoretical Perspective.
Proceedings of the Australasian Conference on Information Systems, 2017
Proceedings of the Australasian Conference on Information Systems, 2017
2016
CoRR, 2016
Comput. Hum. Behav., 2016
A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective.
Proceedings of the Australasian Conference on Information Systems, 2016
2015
A Critical Review of Theories and Models of Technology Adoption and Acceptance in Information System Research.
Int. J. Technol. Diffusion, 2015
Designing a mobile game to thwarts malicious IT threats: A phishing threat avoidance perspective.
CoRR, 2015
CoRR, 2015
CoRR, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
2014
Comput. Hum. Behav., 2014
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014
A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
2012
PhD thesis, 2012