Login / Signup
Persuasion: How phishing emails can influence users and bypass security measures.
Ana Ferreira
Soraia Teles
Published in:
Int. J. Hum. Comput. Stud. (2019)
Keyphrases
</>
social influence
security measures
phishing emails
countermeasures
database
data mining
association rules
security policies
email messages