The Role of E-Training in Protecting Information Assets Against Deception Attacks.
Joey F. GeorgeDavid P. BirosJudee K. BurgoonJay F. Nunamaker Jr.Janna M. CrewsJinwei CaoKent MarettMark AdkinsJohn KruseMing LinPublished in: MIS Q. Executive (2008)
Keyphrases