Waldo Rocha Flores

According to our database1, Waldo Rocha Flores authored at least 17 papers between 2008 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Gamification of Information Security Awareness and Training.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness.
Comput. Secur., 2016

2015
Investigating personal determinants of phishing and the effect of national culture.
Inf. Comput. Secur., 2015

Investigating the Correlation between Intention and Action in the Context of Social Engineering in Two Different National Cultures.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Exploring the Link Between Behavioural Information Security Governance and Employee Information Security Awareness.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2014
Using phishing experiments and scenario-based surveys to understand security behaviours in practice.
Inf. Manag. Comput. Secur., 2014

Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture.
Comput. Secur., 2014

An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks.
Proceedings of the 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, 2014

2013
Cyber security for a Smart Grid - What about phishing?
Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies Europe, 2013

Establishment of Security Knowledge Sharing in Organisations: An Empirical Study.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

Countermeasures for Social Engineering-based Malware Installation Attacks.
Proceedings of the CONF-IRM 2013, 2013

The development of an instrument for assessing information security in organizations: Examining the content validity using quantitative methods.
Proceedings of the CONF-IRM 2013, 2013

2011
Information Security Governance Analysis Using Probabilistic Relational Models.
Proceedings of the WOSIS 2011, 2011

Expert opinions on information security governance factors: an exploratory study.
Proceedings of the 19th European Conference on Information Systems, 2011

2009
Enterprise architecture dependency analysis using fault trees and Bayesian networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

Enterprise Architecture Analysis using Fault Trees and MODAF.
Proceedings of the Forum at the CAiSE 2009 Conference, 2009

2008
Using Enterprise Architecture Models and Bayesian Belief Networks for Failure Impact Analysis.
Proceedings of the Service-Oriented Computing - ICSOC 2008 Workshops, 2008


  Loading...