Login / Signup
Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.
Ryan T. Wright
Matthew L. Jensen
Jason Bennett Thatcher
Michael Dinger
Kent Marett
Published in:
Inf. Syst. Res. (2014)
Keyphrases
</>
phishing attacks
security risks
internet users
information security
phishing emails
query logs
information retrieval
probabilistic model
co occurrence