Sign in

Using phishing experiments and scenario-based surveys to understand security behaviours in practice.

Waldo Rocha FloresHannes HolmGustav SvenssonGöran Ericsson
Published in: Inf. Manag. Comput. Secur. (2014)
Keyphrases