Christopher B. Mayhorn

Orcid: 0000-0003-2587-9042

According to our database1, Christopher B. Mayhorn authored at least 15 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Empathy and AI: Achieving Equitable Microtransit for Underserved Communities.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

2016
The persuasive phish: examining the social psychological principles hidden in phishing emails.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Differences in trust between human and automated decision aids.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

2015
Will the "Phisher-Men" Reel You In?: Assessing Individual Differences in a Phishing Detection Task.
Int. J. Cyber Behav. Psychol. Learn., 2015

Quantifying developers' adoption of security tools.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Exploring expert and novice mental models of phishing.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

All signals go: investigating how individual differences affect performance on a medical diagnosis task designed to parallel a signals intelligence analyst task.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
Phishing in international waters: exploring cross-national differences in phishing conceptualizations between Chinese, Indian and American samples.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

2013
American and Indian Conceptualizations of Phishing.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

2008
Trusting the Internet: Cues Affecting Perceived Credibility.
Int. J. Technol. Hum. Interact., 2008

2006
To download or not to download: an examination of computer security decision making.
Interactions, 2006

Persuasive Pillboxes: Improving Medication Adherence with Personal Digital Assistants.
Proceedings of the Persuasive Technology, 2006

2005
Perceptions of Driver Distraction by Cellular Phone Users and Nonusers.
Hum. Factors, 2005

2002
Decisions, Decisions: Analysis of Age, Cohort, and Time of Testing on Framing of Risky Decision Options.
Hum. Factors, 2002

2000
A Survey of World Wide Web Use in Middle-Aged and Older Adults.
Hum. Factors, 2000


  Loading...