Login / Signup

Persuasion: How phishing emails can influence users and bypass security measures.

Ana FerreiraSoraia Teles
Published in: Int. J. Hum. Comput. Stud. (2019)
Keyphrases
  • social influence
  • security measures
  • phishing emails
  • countermeasures
  • database
  • data mining
  • association rules
  • security policies
  • email messages