Sign in
Designing a mobile game to thwarts malicious IT threats: A phishing threat avoidance perspective.
Nalin Asanka Gamagedara Arachchilage
Ali Tarhini
Steve Love
Published in:
CoRR (2015)
Keyphrases
</>
countermeasures
insider threat
mobile games
malicious activities
email
identity theft
information security
mobile phone
mobile devices
learning games
sensor networks
mobile learning
intrusion detection system
computer games
mobile applications
mobile users