Login / Signup
A User-Centered Approach to Phishing Susceptibility: The Role of a Suspicious Personality in Protecting Against Phishing.
Brynne Harrison
Arun Vishwanath
H. Raghav Rao
Published in:
HICSS (2016)
Keyphrases
</>
email
identity theft
spam filtering
user centered
phishing attacks
countermeasures
internet users
malicious activities
user preferences
user interaction
phishing emails
user interface
fraud detection
user experience
collaborative filtering
end users
user defined
third party
user model
anomaly detection