Why Do Some People Manage Phishing Emails Better Than Others?

Malcolm Robert PattinsonCate JerramKathryn ParsonsAgata McCormacMarcus A. Butavicius
Published in: Inf. Manag. Comput. Secur. (2012)
Keyphrases
  • phishing emails
  • phishing attacks
  • confidential information
  • email
  • case study
  • feature space
  • email messages