Login / Signup

Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.

Ryan T. WrightMatthew L. JensenJason Bennett ThatcherMichael DingerKent Marett
Published in: Inf. Syst. Res. (2014)
Keyphrases
  • phishing attacks
  • security risks
  • internet users
  • information security
  • phishing emails
  • query logs
  • information retrieval
  • probabilistic model
  • co occurrence