Nalin Asanka Gamagedara Arachchilage
Nalin Asanka Gamagedara Arachchilage
Senior Research Fellow in Cyber Security ← La Trobe University ← UNSW ← UBC ← Oxford University
Verified email at latrobe.edu.au - Homepage
Title
Cited by
Cited by
Year
Security awareness of computer users: A phishing threat avoidance perspective
NAG Arachchilage, S Love
Computers in Human Behavior 38, 304-312, 2014
2492014
A game design framework for avoiding phishing attacks
NAG Arachchilage, S Love
Computers in Human Behavior 29 (3), 706-714, 2013
1752013
A critical review of theories and models of technology adoption and acceptance in information system research
A Tarhini, NAG Arachchilage, MS Abbasi
International Journal of Technology Diffusion (IJTD) 6 (4), 58-77, 2015
1192015
Phishing threat avoidance behaviour: An empirical investigation
NAG Arachchilage, S Love, K Beznosov
Computers in Human Behavior 60, 185-197, 2016
1182016
Defending against phishing attacks: taxonomy of methods, current issues and future directions
BB Gupta, NAG Arachchilage, KE Psannis
Telecommunication Systems 67 (2), 247-267, 2018
1022018
On the Impact of Touch ID on iPhone Passcodes
I Cherapau, I Muslukhov, NAG Arachchilage, K Beznosov
The 11th Symposium on Usable Privacy and Security (SOUPS), USENIX, 257-276, 2015
602015
Design a mobile game for home computer users to prevent from “phishing attacks”
NAG Arachchilage, M Cole
International Conference on Information Society (i-Society 2011), 485-489, 2011
582011
Designing a mobile game to teach conceptual knowledge of avoiding'phishing attacks'
N Arachchilage, S Love, M Scott
International Journal for e-Learning Security 2 (1), 127-132, 2012
402012
A generic cognitive dimensions questionnaire to evaluate the usability of security apis
C Wijayarathna, NAG Arachchilage, J Slay
International Conference on Human Aspects of Information Security, Privacy …, 2017
222017
Why developers cannot embed privacy into software systems? An empirical investigation
A Senarath, NAG Arachchilage
ACM 22nd International Conference on Evaluation and Assessment in Software …, 2018
212018
A taxonomy for securely sharing information among others in a trust domain
NAG Arachchilage, C Namiluko, A Martin
8th International Conference for Internet Technology and Secured …, 2013
162013
Security awareness of computer users: A game based learning approach
NAG Arachchilage
School of Information Systems, Computing and Mathematics, 2012
162012
Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks
NAG Arachchilage, M Cole
Intenatioal Journal for e-Learning Security (IJeLS) 1 (1/2), 8, 2011
16*2011
A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective
MA Hameed, NAG Arachchilage
27th Australasian Conference on Information Systems (ACIS), 2016
152016
Why Johnny Can't Store Passwords Securely?: A Usability Evaluation of Bouncycastle Password Hashing
C Wijayarathna, NAG Arachchilage
ACM the 22nd International Conference on Evaluation and Assessment in …, 2018
122018
Why Johnny can’t develop a secure application? A usability analysis of Java Secure Socket Extension API
C Wijayarathna, NAG Arachchilage
Computers & Security 80, 54-73, 2019
112019
Changing users' security behaviour towards security questions: A game based learning approach
N Micallef, NAG Arachchilage
2017 Military Communications and Information Systems Conference (MilCIS), 1-6, 2017
112017
A Gamified Approach to Improve Users’ Memorability of Fallback Authentication
N Micallef, NAG Arachchilage
The 13th Symposium on Usable Privacy and Security (SOUPS), 6, 2017
112017
Understanding user privacy expectations: A software developer’s perspective
AR Senarath, NAG Arachchilage
Telematics and Informatics 35 (7), 1845-1862, 2018
102018
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
G Misra, NAG Arachchilage, S Berkovsky
International Symposium on Human Aspects of Information Security & Assurance …, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20