Login / Signup

Not All Victims Are Created Equal: Investigating Differential Phishing Susceptibility.

Matthew CanhamShaneé DawkinsJody L. Jacobs
Published in: HCI (11) (2024)
Keyphrases
  • email
  • computer vision
  • case study
  • database systems
  • fraud detection
  • countermeasures
  • spam filtering
  • identity theft
  • phishing attacks
  • data sets
  • genetic algorithm
  • expert systems
  • personal information
  • phishing emails