Login / Signup
Integrating self-efficacy into a gamified approach to thwart phishing attacks.
Nalin Asanka Gamagedara Arachchilage
Mumtaz Abdul Hameed
Published in:
CoRR (2017)
Keyphrases
</>
phishing attacks
security risks
phishing emails
database
data mining
information systems
multimedia
query logs
internet users