Nalin Asanka Gamagedara Arachchilage
Nalin Asanka Gamagedara Arachchilage
Senior Research Fellow in Cyber Security ← La Trobe University ← UNSW ← UBC ← Oxford University
Verified email at latrobe.edu.au - Homepage
Title
Cited by
Cited by
Year
Security awareness of computer users: A phishing threat avoidance perspective
NAG Arachchilage, S Love
Computers in Human Behavior 38, 304-312, 2014
2802014
A game design framework for avoiding phishing attacks
NAG Arachchilage, S Love
Computers in Human Behavior 29 (3), 706-714, 2013
1922013
Defending against phishing attacks: taxonomy of methods, current issues and future directions
BB Gupta, NAG Arachchilage, KE Psannis
Telecommunication Systems 67 (2), 247-267, 2018
1472018
A critical review of theories and models of technology adoption and acceptance in information system research
A Tarhini, NAG Arachchilage, MS Abbasi
International Journal of Technology Diffusion (IJTD) 6 (4), 58-77, 2015
1452015
Phishing threat avoidance behaviour: An empirical investigation
NAG Arachchilage, S Love, K Beznosov
Computers in Human Behavior 60, 185-197, 2016
1362016
On the Impact of Touch ID on iPhone Passcodes
I Cherapau, I Muslukhov, NAG Arachchilage, K Beznosov
The 11th Symposium on Usable Privacy and Security (SOUPS), USENIX, 257-276, 2015
712015
Design a mobile game for home computer users to prevent from “phishing attacks”
NAG Arachchilage, M Cole
International Conference on Information Society (i-Society 2011), 485-489, 2011
592011
Designing a mobile game to teach conceptual knowledge of avoiding'phishing attacks'
N Arachchilage, S Love, M Scott
International Journal for e-Learning Security 2 (1), 127-132, 2012
402012
Why developers cannot embed privacy into software systems? An empirical investigation
A Senarath, NAG Arachchilage
ACM 22nd International Conference on Evaluation and Assessment in Software …, 2018
352018
A generic cognitive dimensions questionnaire to evaluate the usability of security apis
C Wijayarathna, NAG Arachchilage, J Slay
International Conference on Human Aspects of Information Security, Privacy …, 2017
242017
A taxonomy for securely sharing information among others in a trust domain
NAG Arachchilage, C Namiluko, A Martin
8th International Conference for Internet Technology and Secured …, 2013
192013
Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks
NAG Arachchilage, M Cole
Intenatioal Journal for e-Learning Security (IJeLS) 1 (1/2), 8, 2011
19*2011
Why Johnny can’t develop a secure application? A usability analysis of Java Secure Socket Extension API
C Wijayarathna, NAG Arachchilage
Computers & Security 80, 54-73, 2019
182019
Why Johnny Can't Store Passwords Securely?: A Usability Evaluation of Bouncycastle Password Hashing
C Wijayarathna, NAG Arachchilage
ACM the 22nd International Conference on Evaluation and Assessment in …, 2018
182018
Security awareness of computer users: A game based learning approach
NAG Arachchilage
School of Information Systems, Computing and Mathematics, 2012
182012
A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective
MA Hameed, NAG Arachchilage
27th Australasian Conference on Information Systems (ACIS), 2016
172016
Understanding user privacy expectations: A software developer’s perspective
AR Senarath, NAG Arachchilage
Telematics and Informatics 35 (7), 1845-1862, 2018
132018
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
G Misra, NAG Arachchilage, S Berkovsky
International Symposium on Human Aspects of Information Security & Assurance …, 2017
132017
Changing users' security behaviour towards security questions: A game based learning approach
N Micallef, NAG Arachchilage
2017 Military Communications and Information Systems Conference (MilCIS), 1-6, 2017
132017
A Gamified Approach to Improve Users’ Memorability of Fallback Authentication
N Micallef, NAG Arachchilage
The 13th Symposium on Usable Privacy and Security (SOUPS), 6, 2017
122017
The system can't perform the operation now. Try again later.
Articles 1–20