Login / Signup

How Perceptions of Caller Honesty Vary During Vishing Attacks That Include Highly Sensitive or Seemingly Innocuous Requests.

Miriam E. ArmstrongKeith S. JonesAkbar Siami Namin
Published in: Hum. Factors (2023)
Keyphrases
  • neural network
  • attitudes toward
  • malicious attacks
  • countermeasures
  • database
  • data mining
  • website
  • wireless sensor networks
  • watermarking scheme
  • computer security
  • image watermarking
  • user requests
  • positively correlated